CVE-2025-40555: CWE-440: Expected Behavior Violation in Siemens APOGEE PXC+TALON TC Series (BACnet)
A vulnerability has been identified in APOGEE PXC+TALON TC Series (BACnet) (All versions). Affected devices start sending unsolicited BACnet broadcast messages after processing a specific BACnet createObject request. This could allow an attacker residing in the same BACnet network to send a specially crafted message that results in a partial denial of service condition of the targeted device, and potentially reduce the availability of BACnet network. A power cycle is required to restore the device's normal operation.
AI Analysis
Technical Summary
CVE-2025-40555 is a medium-severity vulnerability affecting Siemens APOGEE PXC+TALON TC Series devices that use the BACnet protocol. The issue arises when the device processes a specially crafted BACnet createObject request, causing it to start sending unsolicited BACnet broadcast messages. This behavior violates expected protocol operations (CWE-440: Expected Behavior Violation). An attacker located within the same BACnet network can exploit this flaw to trigger a partial denial of service (DoS) condition on the targeted device. The DoS manifests as a disruption in device availability and potentially degrades the overall BACnet network's availability. Recovery from this state requires a manual power cycle of the affected device. The vulnerability does not affect confidentiality or integrity but impacts availability. It requires no privileges or user interaction to exploit, but the attacker must have access to the BACnet network segment. Siemens has not yet released a patch, and no known exploits are currently in the wild. The CVSS v3.1 base score is 4.7, reflecting a medium severity level, with attack vector as adjacent network, low attack complexity, no privileges required, no user interaction, and scope changed due to potential network-wide impact.
Potential Impact
For European organizations, especially those in critical infrastructure sectors such as energy, manufacturing, and building automation, this vulnerability poses a risk to operational continuity. Siemens APOGEE PXC+TALON TC Series devices are commonly used in building management and industrial control systems across Europe. An attacker exploiting this vulnerability could cause partial denial of service on these devices, leading to disruptions in HVAC, lighting, or other automated controls. This could result in operational inefficiencies, increased energy costs, or safety concerns in sensitive environments. The requirement for a power cycle to restore normal operation means that automated recovery is not possible, potentially causing prolonged downtime. While the vulnerability does not allow data theft or manipulation, the availability impact on critical control systems could have cascading effects on business operations and safety compliance.
Mitigation Recommendations
European organizations should immediately identify and inventory all Siemens APOGEE PXC+TALON TC Series devices on their BACnet networks. Network segmentation should be enforced to isolate BACnet devices from general IT networks and restrict access to trusted management stations only. Implement strict network access controls and monitoring for unusual BACnet createObject requests or unexpected broadcast traffic. Since no patch is currently available, consider deploying network-level BACnet protocol anomaly detection tools to detect and block malformed or unexpected BACnet messages. Establish procedures for rapid manual intervention, including power cycling affected devices if a DoS condition is detected. Engage with Siemens support channels for updates on patches or firmware upgrades. Additionally, review and harden BACnet device configurations to minimize exposure to unsolicited requests and disable unnecessary BACnet services where possible.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-40555: CWE-440: Expected Behavior Violation in Siemens APOGEE PXC+TALON TC Series (BACnet)
Description
A vulnerability has been identified in APOGEE PXC+TALON TC Series (BACnet) (All versions). Affected devices start sending unsolicited BACnet broadcast messages after processing a specific BACnet createObject request. This could allow an attacker residing in the same BACnet network to send a specially crafted message that results in a partial denial of service condition of the targeted device, and potentially reduce the availability of BACnet network. A power cycle is required to restore the device's normal operation.
AI-Powered Analysis
Technical Analysis
CVE-2025-40555 is a medium-severity vulnerability affecting Siemens APOGEE PXC+TALON TC Series devices that use the BACnet protocol. The issue arises when the device processes a specially crafted BACnet createObject request, causing it to start sending unsolicited BACnet broadcast messages. This behavior violates expected protocol operations (CWE-440: Expected Behavior Violation). An attacker located within the same BACnet network can exploit this flaw to trigger a partial denial of service (DoS) condition on the targeted device. The DoS manifests as a disruption in device availability and potentially degrades the overall BACnet network's availability. Recovery from this state requires a manual power cycle of the affected device. The vulnerability does not affect confidentiality or integrity but impacts availability. It requires no privileges or user interaction to exploit, but the attacker must have access to the BACnet network segment. Siemens has not yet released a patch, and no known exploits are currently in the wild. The CVSS v3.1 base score is 4.7, reflecting a medium severity level, with attack vector as adjacent network, low attack complexity, no privileges required, no user interaction, and scope changed due to potential network-wide impact.
Potential Impact
For European organizations, especially those in critical infrastructure sectors such as energy, manufacturing, and building automation, this vulnerability poses a risk to operational continuity. Siemens APOGEE PXC+TALON TC Series devices are commonly used in building management and industrial control systems across Europe. An attacker exploiting this vulnerability could cause partial denial of service on these devices, leading to disruptions in HVAC, lighting, or other automated controls. This could result in operational inefficiencies, increased energy costs, or safety concerns in sensitive environments. The requirement for a power cycle to restore normal operation means that automated recovery is not possible, potentially causing prolonged downtime. While the vulnerability does not allow data theft or manipulation, the availability impact on critical control systems could have cascading effects on business operations and safety compliance.
Mitigation Recommendations
European organizations should immediately identify and inventory all Siemens APOGEE PXC+TALON TC Series devices on their BACnet networks. Network segmentation should be enforced to isolate BACnet devices from general IT networks and restrict access to trusted management stations only. Implement strict network access controls and monitoring for unusual BACnet createObject requests or unexpected broadcast traffic. Since no patch is currently available, consider deploying network-level BACnet protocol anomaly detection tools to detect and block malformed or unexpected BACnet messages. Establish procedures for rapid manual intervention, including power cycling affected devices if a DoS condition is detected. Engage with Siemens support channels for updates on patches or firmware upgrades. Additionally, review and harden BACnet device configurations to minimize exposure to unsolicited requests and disable unnecessary BACnet services where possible.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- siemens
- Date Reserved
- 2025-04-16T08:20:17.029Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd65a3
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/12/2025, 2:02:51 AM
Last updated: 1/7/2026, 5:39:05 AM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.