A vulnerability has been identified in APOGEE MBC (PPC) (P2 Ethernet) (All versions >= V2.6.3), APOGEE MEC (PPC) (P2 Ethernet) (All versions >= V2.6.3), APOGEE PXC Compact (BACnet) (All versions < V3.5.3), APOGEE PXC Compact (P2 Ethernet) (All versions >= V2.8), APOGEE PXC Modular (BACnet) (All versions < V3.5.3), APOGEE PXC Modular (P2 Ethernet) (All versions >= V2.8), TALON TC Compact (BACnet) (All versions < V3.5.3), TALON TC Modular (BACnet) (All versions < V3.5.3). The web server of affected devices lacks proper bounds checking when parsing the Host parameter in HTTP requests, which could lead to a buffer overflow. An unauthenticated remote attacker could exploit this vulnerability to execute arbitrary code on the device with root privileges.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Siemens
Subscribe
|
Apogee Mbc \(ppc\) \(p2 Ethernet\)
Subscribe
Apogee Mbc \(ppc\) \(p2 Ethernet\) Firmware
Subscribe
Apogee Mec \(ppc\) \(p2 Ethernet\)
Subscribe
Apogee Mec \(ppc\) \(p2 Ethernet\) Firmware
Subscribe
Apogee Pxc Bacnet Automation Controller
Subscribe
Apogee Pxc Bacnet Automation Controller Firmware
Subscribe
Apogee Pxc Compact \(p2 Ethernet\)
Subscribe
Apogee Pxc Compact \(p2 Ethernet\) Firmware
Subscribe
Apogee Pxc Modular \(bacnet\)
Subscribe
Apogee Pxc Modular \(bacnet\) Firmware
Subscribe
Apogee Pxc Modular \(p2 Ethernet\)
Subscribe
Apogee Pxc Modular \(p2 Ethernet\) Firmware
Subscribe
Talon Tc Compact \(bacnet\)
Subscribe
Talon Tc Compact \(bacnet\) Firmware
Subscribe
Talon Tc Modular \(bacnet\)
Subscribe
Talon Tc Modular \(bacnet\) Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-14146 | A vulnerability has been identified in APOGEE MBC (PPC) (P2 Ethernet) (All versions >= V2.6.3), APOGEE MEC (PPC) (P2 Ethernet) (All versions >= V2.6.3), APOGEE PXC Compact (BACnet) (All versions < V3.5.3), APOGEE PXC Compact (P2 Ethernet) (All versions >= V2.8), APOGEE PXC Modular (BACnet) (All versions < V3.5.3), APOGEE PXC Modular (P2 Ethernet) (All versions >= V2.8), TALON TC Compact (BACnet) (All versions < V3.5.3), TALON TC Modular (BACnet) (All versions < V3.5.3). The web server of affected devices lacks proper bounds checking when parsing the Host parameter in HTTP requests, which could lead to a buffer overflow. An unauthenticated remote attacker could exploit this vulnerability to execute arbitrary code on the device with root privileges. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 24 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2025-04-23T19:28:38.162Z
Reserved: 2021-02-18T00:00:00.000Z
Link: CVE-2021-27391
Updated: 2024-08-03T20:48:16.974Z
Status : Modified
Published: 2021-09-14T11:15:23.913
Modified: 2025-04-23T20:15:22.940
Link: CVE-2021-27391
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD