Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-38371

CVSS 7.5 · High EPSS 0.79% · P74
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-38371

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.7), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.21), APOGEE PXC Modular (BACnet) (All versions < V3.5.7), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.21), Desigo PXC00-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC00-U (All versions >= V2.3 < V6.30.37), Desigo PXC001-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC100-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC12-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC128-U (All versions >= V2.3 < V6.30.37), Desigo PXC200-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC22-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC22.1-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC36.1-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC50-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC64-U (All versions >= V2.3 < V6.30.37), Desigo PXM20-E (All versions >= V2.3 < V6.30.37), Nucleus NET for Nucleus PLUS V1 (All versions < V5.2a), Nucleus NET for Nucleus PLUS V2 (All versions < V5.4), Nucleus ReadyStart V3 V2012 (All versions < V2012.08.1), Nucleus ReadyStart V3 V2017 (All versions < V2017.02.4), Nucleus Source Code (All versions including affected FTP server), TALON TC Compact (BACnet) (All versions < V3.5.7), TALON TC Modular (BACnet) (All versions < V3.5.7). The FTP server does not properly release memory resources that were reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial of service condition on devices that incorporate a vulnerable version of the FTP server.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Siemens Nucleus NET和Nucleus ReadyStart 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Siemens Nucleus NET和Siemens Nucleus ReadyStart都是德国西门子(Siemens)公司的产品。Siemens Nucleus NET是一个 Siemens 核网。Siemens Nucleus ReadyStart是一个捆绑式解决方案。用于加速完整系统的快速启动并提供丰富的板级支持包 (Bsp) Siemens Nucleus NET和Nucleus ReadyStart 存在资源管理错误漏洞,该漏洞源于FTP服务器无法正确释放内存资源。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
SiemensAPOGEE MBC (PPC) (BACnet) All versions -
SiemensAPOGEE MBC (PPC) (P2 Ethernet) All versions -
SiemensAPOGEE MEC (PPC) (BACnet) All versions -
SiemensAPOGEE MEC (PPC) (P2 Ethernet) All versions -
SiemensAPOGEE PXC Compact (BACnet) 0 ~ V3.5.7 -
SiemensAPOGEE PXC Compact (P2 Ethernet) 0 ~ V2.8.21 -
SiemensAPOGEE PXC Modular (BACnet) 0 ~ V3.5.7 -
SiemensAPOGEE PXC Modular (P2 Ethernet) 0 ~ V2.8.21 -
SiemensDesigo PXC00-E.D V2.3 ~ V6.30.37 -
SiemensDesigo PXC00-U V2.3 ~ V6.30.37 -
SiemensDesigo PXC001-E.D V2.3 ~ V6.30.37 -
SiemensDesigo PXC100-E.D V2.3 ~ V6.30.37 -
SiemensDesigo PXC12-E.D V2.3 ~ V6.30.37 -
SiemensDesigo PXC128-U V2.3 ~ V6.30.37 -
SiemensDesigo PXC200-E.D V2.3 ~ V6.30.37 -
SiemensDesigo PXC22-E.D V2.3 ~ V6.30.37 -
SiemensDesigo PXC22.1-E.D V2.3 ~ V6.30.37 -
SiemensDesigo PXC36.1-E.D V2.3 ~ V6.30.37 -
SiemensDesigo PXC50-E.D V2.3 ~ V6.30.37 -
SiemensDesigo PXC64-U V2.3 ~ V6.30.37 -
SiemensDesigo PXM20-E V2.3 ~ V6.30.37 -
SiemensNucleus NET for Nucleus PLUS V1 All versions < V5.2a -
SiemensNucleus NET for Nucleus PLUS V2 All versions < V5.4 -
SiemensNucleus ReadyStart V3 V2012 All versions < V2012.08.1 -
SiemensNucleus ReadyStart V3 V2017 All versions < V2017.02.4 -
SiemensNucleus Source Code 0 ~ * -
SiemensTALON TC Compact (BACnet) 0 ~ V3.5.7 -
SiemensTALON TC Modular (BACnet) 0 ~ V3.5.7 -

II. Public POCs for CVE-2022-38371

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-38371

登录查看更多情报信息。

Same Patch Batch · Siemens · 2022-10-11 · 22 CVEs total

CVE-2022-363619.8 CRITICALSiemens LOGO! 8 BM 安全漏洞
CVE-2022-416659.8 CRITICALSiemens SICAM P850 和SICAM P855 安全漏洞
CVE-2022-384659.3 CRITICAL多款Siemens产品安全漏洞
CVE-2022-317658.8 HIGHSiemens RUGGEDCOM RM1224 安全漏洞
CVE-2022-317668.6 HIGHSiemens RUGGEDCOM RM1224 输入验证错误漏洞
CVE-2022-363627.5 HIGHSiemens LOGO! 8 BM 输入验证错误漏洞
CVE-2022-402267.5 HIGH多款Siemens产品授权问题漏洞
CVE-2022-363635.3 MEDIUMSiemens LOGO! 8 BM 输入验证错误漏洞
CVE-2022-41851Siemens Simcenter Femap 缓冲区错误漏洞
CVE-2022-40631Siemens Scalance X-200 跨站脚本漏洞
CVE-2022-40227Siemens SIMATIC HMI Comfort Panels 输入验证错误漏洞
CVE-2022-40182多款Siemens产品安全漏洞
CVE-2022-40181多款Siemens产品跨站脚本漏洞
CVE-2022-40180多款Siemens产品跨站请求伪造漏洞
CVE-2022-40179多款Siemens产品跨站请求伪造漏洞
CVE-2022-40178多款Siemens产品跨站脚本漏洞
CVE-2022-40177多款Siemens产品信息泄露漏洞
CVE-2022-40176多款Siemens产品操作系统命令注入漏洞
CVE-2022-40147Siemens Industrial Edge Management 信任管理问题漏洞
CVE-2022-37864Siemens Solid Edge 缓冲区错误漏洞

Showing top 20 of 22 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2022-38371

No comments yet


Leave a comment