Vulnerability in APOGEE and TALON devices allows unauthorized access
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
![]() | CVE-2022-45937 | 13 Dec 202216:15 | – | nvd |
![]() | CVE-2022-45937 | 13 Dec 202216:15 | – | cve |
![]() | Siemens APOGEE and TALON Improper Access Control (CVE-2022-45937) | 25 Jan 202300:00 | – | nessus |
![]() | Information disclosure | 13 Dec 202216:15 | – | prion |
![]() | CVE-2022-45937 | 13 Dec 202200:00 | – | vulnrichment |
![]() | Siemens APOGEE/TALON Field Panels Privilege Management Vulnerability | 14 Dec 202200:00 | – | cnvd |
![]() | CVE-2022-45937 | 5 Feb 202522:25 | – | redhatcve |
![]() | Siemens APOGEE and TALON | 13 Dec 202200:00 | – | ics |
[
{
"vendor": "Siemens",
"product": "APOGEE PXC Compact (BACnet)",
"versions": [
{
"version": "All versions < V3.5.5",
"status": "affected"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "APOGEE PXC Compact (P2 Ethernet)",
"versions": [
{
"version": "All versions < V2.8.20",
"status": "affected"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "APOGEE PXC Modular (BACnet)",
"versions": [
{
"version": "All versions < V3.5.5",
"status": "affected"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "APOGEE PXC Modular (P2 Ethernet)",
"versions": [
{
"version": "All versions < V2.8.20",
"status": "affected"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "TALON TC Compact (BACnet)",
"versions": [
{
"version": "All versions < V3.5.5",
"status": "affected"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "TALON TC Modular (BACnet)",
"versions": [
{
"version": "All versions < V3.5.5",
"status": "affected"
}
],
"defaultStatus": "unknown"
}
]
Source | Link |
---|---|
cert-portal | www.cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo