Information Disclosure Vulnerability in Apogee PXC and Talon TC Devices
Monitor5.3SSA-916339Sep 9, 2025
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
Apogee PXC and Talon TC devices contain an information disclosure vulnerability that allows an attacker to download the device encrypted database file. The vulnerability affects all versions of APOGEE PXC Series (BACnet), APOGEE PXC Series (P2 Ethernet), and TALON TC Series (BACnet). Siemens is preparing fix versions and recommends protective network access controls for affected installations.
What this means
What could happen
An attacker could download the encrypted database file from affected PXC and TC devices, potentially exposing configuration, control logic, and operational data. While the file is encrypted, its theft could enable unauthorized analysis of device configuration and control parameters.
Who's at risk
Building automation and environmental control operators using Apogee PXC or Talon TC series devices for HVAC, lighting, and facility management systems. Facility engineers and controls contractors who maintain these systems should prioritize protecting network access to these devices, particularly in networked installations where remote management is enabled.
How it could be exploited
An attacker with network access to an affected Apogee PXC or Talon TC device can directly request the encrypted database file without authentication. The attacker gains the database file contents, which while encrypted, could be analyzed offline or decrypted with sufficient effort, revealing device configuration and operational settings.
Prerequisites
- Network access to the Apogee PXC or Talon TC device on its management interface
- No credentials required
remotely exploitableno authentication requiredlow complexityno patch availableinformation disclosure
Exploitability
Low exploit probability (EPSS 0.0%)
Affected products (3)
3 EOL
ProductAffected VersionsFix Status
APOGEE PXC Series (BACnet)All versionsNo fix (EOL)
TALON TC Series (BACnet)All versionsNo fix (EOL)
APOGEE PXC Series (P2 Ethernet)All versionsNo fix (EOL)
Remediation & Mitigation
0/3
Do now
0/2HARDENINGImplement network access controls to restrict direct connectivity to Apogee PXC and Talon TC devices; use firewalls to limit access to authorized personnel and engineering workstations only
HARDENINGSegment Apogee PXC and Talon TC devices onto a protected network isolated from general IT networks and untrusted systems
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXMonitor for and apply patch versions when Siemens releases fixes; check Siemens security advisories regularly
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/7043c57a-3334-4f94-9fc3-1d7cb45b7b51