CVE-2024-54089
Published: 11 February 2025
Description
A vulnerability has been identified in APOGEE PXC Series (BACnet) (All versions), APOGEE PXC Series (P2 Ethernet) (All versions), TALON TC Series (BACnet) (All versions). Affected devices contain a weak encryption mechanism based on a hard-coded key. This could allow an attacker to guess or decrypt the password from the cyphertext.
Security Summary
CVE-2024-54089 is a vulnerability in all versions of Siemens APOGEE PXC Series (BACnet), APOGEE PXC Series (P2 Ethernet), and TALON TC Series (BACnet) building controllers. These affected devices implement a weak encryption mechanism based on a hard-coded key, which enables attackers to guess or decrypt passwords from ciphertext. The issue is classified under CWE-326 (Inadequate Encryption Strength) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to significant confidentiality impact.
A remote, unauthenticated attacker with network access can exploit this vulnerability with low attack complexity and no user interaction. Exploitation involves capturing ciphertext from the device and using the known hard-coded key to decrypt stored or transmitted passwords, potentially granting access to device configurations or controls in building automation systems.
Siemens has published security advisory SSA-615116 at https://cert-portal.siemens.com/productcert/html/ssa-615116.html, which details the vulnerability and affected products.
Details
- CWE(s)