// For flags

CVE-2024-22039

 

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions < IP8), Cerberus PRO EN Fire Panel FC72x IP6 (All versions < IP6 SR3), Cerberus PRO EN Fire Panel FC72x IP7 (All versions < IP7 SR5), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions < V3.0.6602), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.0.5016), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions < V3.2.6601), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.2.5015), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions < MP8), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions < MP6 SR3), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions < MP7 SR5), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions < V3.0.6602), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.0.5016), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions < V3.2.6601), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.2.5015), Sinteso Mobile (All versions < V3.0.0). The network communication library in affected systems does not validate the length of certain X.509 certificate attributes which might result in a stack-based buffer overflow.
This could allow an unauthenticated remote attacker to execute code on the underlying operating system with root privileges.

Se ha identificado una vulnerabilidad en Cerberus PRO EN Engineering Tool (todas las versiones &lt; IP8), Cerberus PRO EN Fire Panel FC72x (todas las versiones &lt; IP8), Cerberus PRO EN X200 Cloud Distribution (todas las versiones &lt; V4.0.5016), Cerberus PRO EN X300 Distribución en la nube (todas las versiones &lt; V4.2.5015), herramienta de ingeniería Sinteso FS20 EN (todas las versiones &lt; MP8), central de incendios Sinteso FS20 EN FC20 (todas las versiones &lt; MP8), distribución en la nube Sinteso FS20 EN X200 (todas las versiones &lt; V4.0.5016) , Sinteso FS20 EN X300 Cloud Distribution (todas las versiones

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-01-04 CVE Reserved
  • 2024-03-12 CVE Published
  • 2024-04-21 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Cerberus Pro En Engineering Tool
Search vendor "Siemens" for product "Cerberus Pro En Engineering Tool"
< ip8
Search vendor "Siemens" for product "Cerberus Pro En Engineering Tool" and version " < ip8"
-
Affected
Siemens
Search vendor "Siemens"
Cerberus Pro En Fire Panel Fc72x
Search vendor "Siemens" for product "Cerberus Pro En Fire Panel Fc72x"
< ip8
Search vendor "Siemens" for product "Cerberus Pro En Fire Panel Fc72x" and version " < ip8"
-
Affected
Siemens
Search vendor "Siemens"
Cerberus Pro En X200 Cloud Distribution
Search vendor "Siemens" for product "Cerberus Pro En X200 Cloud Distribution"
< 4.0.5016
Search vendor "Siemens" for product "Cerberus Pro En X200 Cloud Distribution" and version " < 4.0.5016"
-
Affected
Siemens
Search vendor "Siemens"
Cerberus Pro En X300 Cloud Distribution
Search vendor "Siemens" for product "Cerberus Pro En X300 Cloud Distribution"
< 4.2.5015
Search vendor "Siemens" for product "Cerberus Pro En X300 Cloud Distribution" and version " < 4.2.5015"
-
Affected
Siemens
Search vendor "Siemens"
Sinteso Fs20 En Engineering Tool
Search vendor "Siemens" for product "Sinteso Fs20 En Engineering Tool"
< mp8
Search vendor "Siemens" for product "Sinteso Fs20 En Engineering Tool" and version " < mp8"
-
Affected
Siemens
Search vendor "Siemens"
Sinteso Fs20 En Fire Panel Fc20
Search vendor "Siemens" for product "Sinteso Fs20 En Fire Panel Fc20"
< mp8
Search vendor "Siemens" for product "Sinteso Fs20 En Fire Panel Fc20" and version " < mp8"
-
Affected
Siemens
Search vendor "Siemens"
Sinteso Fs20 En X200 Cloud Distribution
Search vendor "Siemens" for product "Sinteso Fs20 En X200 Cloud Distribution"
< 4.0.5016
Search vendor "Siemens" for product "Sinteso Fs20 En X200 Cloud Distribution" and version " < 4.0.5016"
-
Affected
Siemens
Search vendor "Siemens"
Sinteso Fs20 En X300 Cloud Distribution
Search vendor "Siemens" for product "Sinteso Fs20 En X300 Cloud Distribution"
< 4.2.5015
Search vendor "Siemens" for product "Sinteso Fs20 En X300 Cloud Distribution" and version " < 4.2.5015"
-
Affected
Siemens
Search vendor "Siemens"
Sinteso Mobile
Search vendor "Siemens" for product "Sinteso Mobile"
< 3.0.0
Search vendor "Siemens" for product "Sinteso Mobile" and version " < 3.0.0"
-
Affected