Skip to main content

CVE-2025-24510: CWE-20: Improper Input Validation in Siemens MS/TP Point Pickup Module

Medium
VulnerabilityCVE-2025-24510cvecve-2025-24510cwe-20
Published: Tue May 13 2025 (05/13/2025, 09:38:33 UTC)
Source: CVE
Vendor/Project: Siemens
Product: MS/TP Point Pickup Module

Description

A vulnerability has been identified in MS/TP Point Pickup Module (All versions). Affected devices improperly handle specific incoming BACnet MSTP messages. This could allow an attacker residing in the same BACnet network to send a specially crafted MSTP message that results in a denial of service condition of the targeted device. A power cycle is required to restore the device's normal operation.

AI-Powered Analysis

AILast updated: 07/06/2025, 18:28:18 UTC

Technical Analysis

CVE-2025-24510 is a medium-severity vulnerability affecting Siemens MS/TP Point Pickup Modules, which are components used in building automation systems communicating over BACnet MSTP (Master-Slave/Token-Passing) networks. The vulnerability arises from improper input validation (CWE-20) of specific incoming BACnet MSTP messages. An attacker with access to the same BACnet MSTP network segment can send specially crafted MSTP messages that cause the targeted device to enter a denial of service (DoS) state. This DoS condition renders the device non-functional until a manual power cycle is performed to restore normal operation. The vulnerability does not impact confidentiality or integrity but affects availability critically. No authentication or user interaction is required to exploit this vulnerability, and the attack vector is adjacent network access (AV:A), meaning the attacker must be on the same local BACnet MSTP network. The CVSS v3.1 base score is 6.5, reflecting a medium severity level due to the ease of exploitation and impact on availability without compromising data confidentiality or integrity. No patches have been published yet, and no known exploits are currently in the wild. Siemens MS/TP Point Pickup Modules are widely used in industrial and commercial building automation for controlling HVAC and other systems, making this vulnerability relevant for operational technology environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk to building automation and industrial control systems that rely on Siemens MS/TP Point Pickup Modules. A successful exploitation can disrupt critical building functions such as heating, ventilation, air conditioning, and lighting control, potentially causing operational downtime, discomfort, and increased energy costs. In sensitive environments like hospitals, data centers, or manufacturing plants, such disruptions could lead to safety risks or production losses. Since the attack requires local network access, the threat is more pronounced in environments where BACnet MSTP networks are accessible or insufficiently segmented from general IT networks. The lack of confidentiality or integrity impact reduces the risk of data breaches, but the availability impact can affect business continuity and safety compliance. European organizations with integrated building management systems must consider this vulnerability in their risk assessments and incident response planning.

Mitigation Recommendations

1. Network Segmentation: Isolate BACnet MSTP networks from general IT networks and restrict access to authorized personnel and devices only. Use VLANs or physical separation to limit exposure. 2. Access Controls: Implement strict access control policies on BACnet MSTP networks, including monitoring and logging of network traffic to detect anomalous MSTP messages. 3. Device Hardening: Disable unused services and interfaces on Siemens MS/TP Point Pickup Modules to reduce attack surface. 4. Monitoring and Detection: Deploy network intrusion detection systems (NIDS) capable of recognizing malformed or suspicious BACnet MSTP traffic patterns. 5. Incident Response: Prepare procedures for rapid power cycling of affected devices to restore service if a DoS attack occurs. 6. Vendor Coordination: Engage with Siemens for updates on patches or firmware upgrades addressing this vulnerability and plan timely deployment once available. 7. Physical Security: Ensure physical security controls prevent unauthorized personnel from accessing BACnet MSTP network hardware. These measures go beyond generic advice by focusing on the unique characteristics of BACnet MSTP networks and the operational environment of building automation systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2025-01-22T12:55:35.805Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fc1484d88663aeccac

Added to database: 5/20/2025, 6:59:08 PM

Last enriched: 7/6/2025, 6:28:18 PM

Last updated: 7/31/2025, 12:52:08 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats