Privilege Management Vulnerability and Multiple Nucleus RTOS Vulnerabilities in APOGEE/TALON Field Panels before V3.5.5/V2.8.20
APOGEE PXC and TALON TC field panels running Nucleus RTOS contain multiple vulnerabilities: CVE-2022-45937: A privilege management flaw allows low-privilege authenticated users to escalate to administrative privileges and execute arbitrary commands on the device. An attacker with valid technician credentials could modify building automation logic, alter temperature setpoints, disable equipment interlocks, or stop critical HVAC/process operations. CVE-2020-28388 and DNS implementation flaws in Nucleus RTOS: Predictable TCP Initial Sequence Numbers and weak DNS handling could allow network-based attackers to hijack established connections to the field panel or perform DNS spoofing attacks, redirecting the device to malicious servers. Affected firmware versions: - BACnet-based APOGEE PXC Compact, Modular, TALON TC Compact, and TALON TC Modular: versions before V3.5.5 - P2 Ethernet-based APOGEE PXC Compact and Modular: versions before V2.8.20 Siemens has released corrected firmware for all affected products.
- Valid user credentials (low-privilege account) to authenticate to the field panel
- Network access to the field panel's management port (BACnet or P2 Ethernet protocol)
- For TCP hijacking: proximity to the network path between the field panel and the management station to intercept and predict TCP sequence numbers
Patching may require device reboot — plan for process interruption
/api/v1/advisories/69e1316f-5e46-42ac-9847-9ec3d6920e3b