Siemens Apogee PXC and Talon TC Devices
Apogee PXC and Talon TC controllers contain a vulnerability allowing unauthorized download of the device encrypted database file via BACnet or P2 Ethernet network interfaces. The vulnerability requires only network access with no authentication. An attacker could obtain sensitive device configuration, programming logic, and operational parameters in an encrypted file, which may be subject to offline cryptographic attacks or enable further reconnaissance. Siemens is preparing fix versions but has not yet released them. Until patches are available, Siemens recommends restricting network access to the devices using firewalls and implementing protected IT environments per their operational guidelines.
- Network access to the device on BACnet or P2 Ethernet port
- Device connected to a network accessible from attacker's position
- No additional credentials or authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d3ce82da-4bd8-4a10-aa4f-dab048a945a2