Skip to main content

CVE-2025-40757: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Siemens APOGEE PXC Series (BACnet)

Medium
VulnerabilityCVE-2025-40757cvecve-2025-40757cwe-200
Published: Tue Sep 09 2025 (09/09/2025, 08:47:59 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: APOGEE PXC Series (BACnet)

Description

A vulnerability has been identified in APOGEE PXC Series (BACnet) (All versions), APOGEE PXC Series (P2 Ethernet) (All versions), TALON TC Series (BACnet) (All versions). Affected devices connected to the network allow unrestricted access to sensitive files, such as databases. This could allow an attacker to download encrypted .db file containing passwords.

AI-Powered Analysis

AILast updated: 09/09/2025, 09:00:05 UTC

Technical Analysis

CVE-2025-40757 is a medium-severity vulnerability affecting Siemens APOGEE PXC Series (BACnet), APOGEE PXC Series (P2 Ethernet), and TALON TC Series (BACnet) devices. These devices are used in building automation and control systems, often managing HVAC, lighting, and other critical infrastructure components. The vulnerability arises because affected devices allow unrestricted network access to sensitive files, including encrypted database (.db) files that contain passwords. The flaw is categorized under CWE-200, indicating exposure of sensitive information to unauthorized actors. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network (CVSS vector AV:N/AC:L/PR:N/UI:N). Although the database files are encrypted, the exposure of these files could enable attackers to attempt offline password cracking or leverage the information for further attacks against the control systems. The vulnerability affects all versions of the specified products, indicating a systemic design or configuration issue. No patches or mitigations have been published yet, and no known exploits are currently in the wild. Given the critical role these devices play in building management and industrial control environments, unauthorized access to sensitive configuration and credential data could facilitate further compromise or disruption of operational technology (OT) environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security and integrity of building automation and industrial control systems. Exposure of password databases could lead to unauthorized access to control systems, potentially allowing attackers to manipulate environmental controls, disrupt operations, or cause physical damage. This risk is heightened in critical infrastructure sectors such as energy, manufacturing, healthcare, and commercial real estate, where Siemens APOGEE and TALON devices are commonly deployed. The confidentiality breach could also lead to compliance issues under GDPR if personal or sensitive data is indirectly exposed or if operational disruptions impact data availability. Additionally, attackers gaining foothold through this vulnerability could pivot to other parts of the network, increasing the overall risk to enterprise IT and OT convergence environments.

Mitigation Recommendations

Given the lack of available patches, European organizations should immediately implement network segmentation to isolate APOGEE PXC and TALON TC devices from general IT networks and limit access to trusted management stations only. Deploy strict firewall rules to restrict inbound and outbound traffic to these devices, allowing only necessary protocols and IP addresses. Monitor network traffic for unusual access patterns to the devices, especially attempts to download .db files. Employ strong encryption and access controls on management interfaces where possible. Conduct regular audits of device configurations and credentials, and consider implementing multi-factor authentication for device management if supported. Organizations should also engage with Siemens for updates on patches or firmware upgrades and plan for timely deployment once available. Finally, incorporate these devices into OT security monitoring and incident response plans to detect and respond to potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2025-04-16T08:39:30.031Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bfec1952647a71632fbd9c

Added to database: 9/9/2025, 8:58:01 AM

Last enriched: 9/9/2025, 9:00:05 AM

Last updated: 9/9/2025, 9:35:04 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats