{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-38371","assignerOrgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","assignerShortName":"siemens","dateUpdated":"2025-05-13T09:38:10.488Z","dateReserved":"2022-08-16T00:00:00.000Z","datePublished":"2022-10-11T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","shortName":"siemens","dateUpdated":"2025-05-13T09:38:10.488Z"},"descriptions":[{"lang":"en","value":"A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.7), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.21), APOGEE PXC Modular (BACnet) (All versions < V3.5.7), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.21), Desigo PXC00-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC00-U (All versions >= V2.3 < V6.30.37), Desigo PXC001-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC100-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC12-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC128-U (All versions >= V2.3 < V6.30.37), Desigo PXC200-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC22-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC22.1-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC36.1-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC50-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC64-U (All versions >= V2.3 < V6.30.37), Desigo PXM20-E (All versions >= V2.3 < V6.30.37), Nucleus NET for Nucleus PLUS V1 (All versions < V5.2a), Nucleus NET for Nucleus PLUS V2 (All versions < V5.4), Nucleus ReadyStart V3 V2012 (All versions < V2012.08.1), Nucleus ReadyStart V3 V2017 (All versions < V2017.02.4), Nucleus Source Code (All versions including affected FTP server), TALON TC Compact (BACnet) (All versions < V3.5.7), TALON TC Modular (BACnet) (All versions < V3.5.7). The FTP server does not properly release memory resources that were reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial of service condition on devices that incorporate a vulnerable version of the FTP server."}],"affected":[{"vendor":"Siemens","product":"APOGEE MBC (PPC) (BACnet)","versions":[{"status":"affected","version":"All versions"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"APOGEE MBC (PPC) (P2 Ethernet)","versions":[{"status":"affected","version":"All versions"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"APOGEE MEC (PPC) (BACnet)","versions":[{"status":"affected","version":"All versions"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"APOGEE MEC (PPC) (P2 Ethernet)","versions":[{"status":"affected","version":"All versions"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"APOGEE PXC Compact (BACnet)","versions":[{"status":"affected","version":"0","lessThan":"V3.5.7","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"APOGEE PXC Compact (P2 Ethernet)","versions":[{"status":"affected","version":"0","lessThan":"V2.8.21","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"APOGEE PXC Modular (BACnet)","versions":[{"status":"affected","version":"0","lessThan":"V3.5.7","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"APOGEE PXC Modular (P2 Ethernet)","versions":[{"status":"affected","version":"0","lessThan":"V2.8.21","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Desigo PXC00-E.D","versions":[{"status":"affected","version":"V2.3","lessThan":"V6.30.37","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Desigo PXC00-U","versions":[{"status":"affected","version":"V2.3","lessThan":"V6.30.37","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Desigo PXC001-E.D","versions":[{"status":"affected","version":"V2.3","lessThan":"V6.30.37","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Desigo PXC100-E.D","versions":[{"status":"affected","version":"V2.3","lessThan":"V6.30.37","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Desigo PXC12-E.D","versions":[{"status":"affected","version":"V2.3","lessThan":"V6.30.37","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Desigo PXC128-U","versions":[{"status":"affected","version":"V2.3","lessThan":"V6.30.37","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Desigo PXC200-E.D","versions":[{"status":"affected","version":"V2.3","lessThan":"V6.30.37","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Desigo PXC22-E.D","versions":[{"status":"affected","version":"V2.3","lessThan":"V6.30.37","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Desigo PXC22.1-E.D","versions":[{"status":"affected","version":"V2.3","lessThan":"V6.30.37","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Desigo PXC36.1-E.D","versions":[{"status":"affected","version":"V2.3","lessThan":"V6.30.37","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Desigo PXC50-E.D","versions":[{"status":"affected","version":"V2.3","lessThan":"V6.30.37","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Desigo PXC64-U","versions":[{"status":"affected","version":"V2.3","lessThan":"V6.30.37","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Desigo PXM20-E","versions":[{"status":"affected","version":"V2.3","lessThan":"V6.30.37","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Nucleus NET for Nucleus PLUS V1","versions":[{"status":"affected","version":"All versions < V5.2a"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Nucleus NET for Nucleus PLUS V2","versions":[{"status":"affected","version":"All versions < V5.4"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Nucleus ReadyStart V3 V2012","versions":[{"status":"affected","version":"All versions < V2012.08.1"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Nucleus ReadyStart V3 V2017","versions":[{"status":"affected","version":"All versions < V2017.02.4"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"Nucleus Source Code","versions":[{"status":"affected","version":"0","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"TALON TC Compact (BACnet)","versions":[{"status":"affected","version":"0","lessThan":"V3.5.7","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"TALON TC Modular (BACnet)","versions":[{"status":"affected","version":"0","lessThan":"V3.5.7","versionType":"custom"}],"defaultStatus":"unknown"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH"}},{"cvssV4_0":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","baseScore":8.7,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-400","description":"CWE-400: Uncontrolled Resource Consumption","type":"CWE"}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-313313.pdf"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-935500.pdf"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-935500.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-313313.html"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T10:54:03.448Z"},"title":"CVE Program Container","references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-313313.pdf","tags":["x_transferred"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-935500.pdf","tags":["x_transferred"]},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-935500.html","tags":["x_transferred"]},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-313313.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-07T18:15:00.675232Z","id":"CVE-2022-38371","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-17T13:53:27.567Z"}}]}}