Cyber Posture

CVE-2024-54089

High

Published: 11 February 2025

Published
11 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0003 9.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

A vulnerability has been identified in APOGEE PXC Series (BACnet) (All versions), APOGEE PXC Series (P2 Ethernet) (All versions), TALON TC Series (BACnet) (All versions). Affected devices contain a weak encryption mechanism based on a hard-coded key. This could allow an attacker to guess or decrypt the password from the cyphertext.

Security Summary

CVE-2024-54089 is a vulnerability in all versions of Siemens APOGEE PXC Series (BACnet), APOGEE PXC Series (P2 Ethernet), and TALON TC Series (BACnet) building controllers. These affected devices implement a weak encryption mechanism based on a hard-coded key, which enables attackers to guess or decrypt passwords from ciphertext. The issue is classified under CWE-326 (Inadequate Encryption Strength) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to significant confidentiality impact.

A remote, unauthenticated attacker with network access can exploit this vulnerability with low attack complexity and no user interaction. Exploitation involves capturing ciphertext from the device and using the known hard-coded key to decrypt stored or transmitted passwords, potentially granting access to device configurations or controls in building automation systems.

Siemens has published security advisory SSA-615116 at https://cert-portal.siemens.com/productcert/html/ssa-615116.html, which details the vulnerability and affected products.

Details

CWE(s)
CWE-326

References