Skip to main content

CVE-2022-45937: CWE-284: Improper Access Control in Siemens APOGEE PXC Compact (BACnet)

Medium
Published: Tue Dec 13 2022 (12/13/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Siemens
Product: APOGEE PXC Compact (BACnet)

Description

A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). A low privilege authenticated attacker with network access to the integrated web server could download sensitive information from the device containing user account credentials.

AI-Powered Analysis

AILast updated: 06/20/2025, 11:04:36 UTC

Technical Analysis

CVE-2022-45937 is a vulnerability classified under CWE-284 (Improper Access Control) affecting multiple Siemens APOGEE PXC Compact and Modular devices, as well as TALON TC Compact and Modular devices, specifically those using BACnet and P2 Ethernet communication protocols. The affected versions include all releases prior to V3.5.5 for BACnet variants and prior to V2.8.20 for P2 Ethernet variants. The vulnerability allows a low-privilege authenticated attacker with network access to the integrated web server of these devices to download sensitive information, including user account credentials. This indicates that the access control mechanisms protecting sensitive data on the device are insufficient, enabling unauthorized access to critical information once minimal authentication is achieved. The vulnerability does not require high privilege levels, but does require the attacker to have network access and some form of low-level authentication, which could be obtained through credential guessing, phishing, or insider threats. Siemens has not provided public patch links in the provided data, but the fixed versions are indicated. No known exploits are reported in the wild as of the publication date (December 13, 2022). The vulnerability impacts the confidentiality of user credentials, which could lead to further compromise of the device or network if exploited. The devices in question are used in building automation and control systems, often in critical infrastructure environments, making this vulnerability particularly sensitive.

Potential Impact

For European organizations, especially those operating critical infrastructure such as energy management, HVAC systems, and industrial automation, this vulnerability poses a significant risk. Compromise of user credentials could allow attackers to escalate privileges, manipulate building control systems, disrupt operations, or gain a foothold for lateral movement within organizational networks. The exposure of credentials undermines the confidentiality and integrity of the control systems, potentially leading to operational disruptions, safety hazards, and financial losses. Given the widespread deployment of Siemens APOGEE and TALON systems in Europe’s industrial and commercial sectors, exploitation could affect a broad range of organizations including manufacturing plants, utilities, hospitals, and large commercial buildings. The requirement for network access and low-level authentication reduces the attack surface but does not eliminate risk, especially in environments where network segmentation and strong authentication controls are lacking. The absence of known exploits in the wild suggests limited active exploitation currently, but the presence of sensitive credential exposure warrants proactive mitigation to prevent future attacks.

Mitigation Recommendations

1. Immediate upgrade of all affected Siemens APOGEE PXC Compact and Modular devices, as well as TALON TC devices, to versions V3.5.5 (BACnet) and V2.8.20 (P2 Ethernet) or later, where the vulnerability is addressed. 2. Implement strict network segmentation to isolate building automation systems from general IT networks and restrict access to the integrated web servers to only trusted administrators. 3. Enforce strong authentication mechanisms, including complex passwords and, where possible, multi-factor authentication to reduce the risk of credential compromise. 4. Regularly audit and monitor access logs on these devices to detect unusual or unauthorized access attempts promptly. 5. Employ network intrusion detection systems (NIDS) tuned to detect anomalous traffic patterns targeting BACnet and P2 Ethernet protocols. 6. Conduct periodic security assessments and penetration testing focused on building automation systems to identify and remediate access control weaknesses. 7. Educate personnel managing these systems about the risks of credential exposure and best practices for secure device management. 8. If patching is delayed, consider disabling or restricting access to the integrated web server interfaces where feasible, or implement compensating controls such as VPN access with strict authentication.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2022-11-28T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984bc4522896dcbf82c1

Added to database: 5/21/2025, 9:09:31 AM

Last enriched: 6/20/2025, 11:04:36 AM

Last updated: 8/13/2025, 10:35:06 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats