- Description
- A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions < IP8), Cerberus PRO EN Fire Panel FC72x IP6 (All versions < IP6 SR3), Cerberus PRO EN Fire Panel FC72x IP7 (All versions < IP7 SR5), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions < V3.0.6602), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.0.5016), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions < V3.2.6601), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.2.5015), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions < MP8), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions < MP6 SR3), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions < MP7 SR5), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions < V3.0.6602), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.0.5016), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions < V3.2.6601), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.2.5015), Sinteso Mobile (All versions < V3.0.0). The network communication library in affected systems does not validate the length of certain X.509 certificate attributes which might result in a stack-based buffer overflow.
This could allow an unauthenticated remote attacker to execute code on the underlying operating system with root privileges.
- Source
- productcert@siemens.com
- NVD status
- Modified
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siemens:cerberus_pro_en_engineering_tool:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "51481F41-444E-4B78-A15F-516C7EC2F50D",
"versionEndExcluding": "ip8"
},
{
"criteria": "cpe:2.3:a:siemens:cerberus_pro_en_fire_panel_fc72x:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7E15F412-20D3-417B-9DD7-F9861D44644B",
"versionEndExcluding": "ip8"
},
{
"criteria": "cpe:2.3:a:siemens:cerberus_pro_en_x200_cloud_distribution:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F4595AA9-ADC3-49EE-9767-2043DBB7FEE4",
"versionEndExcluding": "4.0.5016"
},
{
"criteria": "cpe:2.3:a:siemens:cerberus_pro_en_x300_cloud_distribution:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C2EC2222-3208-4677-9DC0-84EF66D3C44B",
"versionEndExcluding": "4.2.5015"
},
{
"criteria": "cpe:2.3:a:siemens:sinteso_fs20_en_engineering_tool:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AD41968F-E374-41DB-9B43-551693339918",
"versionEndExcluding": "mp8"
},
{
"criteria": "cpe:2.3:a:siemens:sinteso_fs20_en_fire_panel_fc20:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "82F92204-A977-48F7-9247-B283D9371CCA",
"versionEndExcluding": "mp8"
},
{
"criteria": "cpe:2.3:a:siemens:sinteso_fs20_en_x200_cloud_distribution:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "40675EA2-2B5A-490D-989A-2726941BDA6B",
"versionEndExcluding": "4.0.5016"
},
{
"criteria": "cpe:2.3:a:siemens:sinteso_fs20_en_x300_cloud_distribution:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BE335B38-42D4-4BB4-A549-FDEB897A56AD",
"versionEndExcluding": "4.2.5015"
},
{
"criteria": "cpe:2.3:a:siemens:sinteso_mobile:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AC5EDF20-9665-4487-AF9E-2E4FF12E7BBD",
"versionEndExcluding": "3.0.0"
}
],
"operator": "OR"
}
]
}
]