Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2022-38371
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.7), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.21), APOGEE PXC Modular (BACnet) (All versions < V3.5.7), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.21), Desigo PXC00-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC00-U (All versions >= V2.3 < V6.30.37), Desigo PXC001-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC100-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC12-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC128-U (All versions >= V2.3 < V6.30.37), Desigo PXC200-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC22-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC22.1-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC36.1-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC50-E.D (All versions >= V2.3 < V6.30.37), Desigo PXC64-U (All versions >= V2.3 < V6.30.37), Desigo PXM20-E (All versions >= V2.3 < V6.30.37), Nucleus NET for Nucleus PLUS V1 (All versions < V5.2a), Nucleus NET for Nucleus PLUS V2 (All versions < V5.4), Nucleus ReadyStart V3 V2012 (All versions < V2012.08.1), Nucleus ReadyStart V3 V2017 (All versions < V2017.02.4), Nucleus Source Code (All versions including affected FTP server), TALON TC Compact (BACnet) (All versions < V3.5.7), TALON TC Modular (BACnet) (All versions < V3.5.7). The FTP server does not properly release memory resources that were reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial of service condition on devices that incorporate a vulnerable version of the FTP server.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Siemens Nucleus NET和Nucleus ReadyStart 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Siemens Nucleus NET和Siemens Nucleus ReadyStart都是德国西门子(Siemens)公司的产品。Siemens Nucleus NET是一个 Siemens 核网。Siemens Nucleus ReadyStart是一个捆绑式解决方案。用于加速完整系统的快速启动并提供丰富的板级支持包 (Bsp) Siemens Nucleus NET和Nucleus ReadyStart 存在资源管理错误漏洞,该漏洞源于FTP服务器无法正确释放内存资源。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
SiemensAPOGEE MBC (PPC) (BACnet) All versions -
SiemensAPOGEE MBC (PPC) (P2 Ethernet) All versions -
SiemensAPOGEE MEC (PPC) (BACnet) All versions -
SiemensAPOGEE MEC (PPC) (P2 Ethernet) All versions -
SiemensAPOGEE PXC Compact (BACnet) 0 ~ V3.5.7 -
SiemensAPOGEE PXC Compact (P2 Ethernet) 0 ~ V2.8.21 -
SiemensAPOGEE PXC Modular (BACnet) 0 ~ V3.5.7 -
SiemensAPOGEE PXC Modular (P2 Ethernet) 0 ~ V2.8.21 -
SiemensDesigo PXC00-E.D V2.3 ~ V6.30.37 -
SiemensDesigo PXC00-U V2.3 ~ V6.30.37 -
SiemensDesigo PXC001-E.D V2.3 ~ V6.30.37 -
SiemensDesigo PXC100-E.D V2.3 ~ V6.30.37 -
SiemensDesigo PXC12-E.D V2.3 ~ V6.30.37 -
SiemensDesigo PXC128-U V2.3 ~ V6.30.37 -
SiemensDesigo PXC200-E.D V2.3 ~ V6.30.37 -
SiemensDesigo PXC22-E.D V2.3 ~ V6.30.37 -
SiemensDesigo PXC22.1-E.D V2.3 ~ V6.30.37 -
SiemensDesigo PXC36.1-E.D V2.3 ~ V6.30.37 -
SiemensDesigo PXC50-E.D V2.3 ~ V6.30.37 -
SiemensDesigo PXC64-U V2.3 ~ V6.30.37 -
SiemensDesigo PXM20-E V2.3 ~ V6.30.37 -
SiemensNucleus NET for Nucleus PLUS V1 All versions < V5.2a -
SiemensNucleus NET for Nucleus PLUS V2 All versions < V5.4 -
SiemensNucleus ReadyStart V3 V2012 All versions < V2012.08.1 -
SiemensNucleus ReadyStart V3 V2017 All versions < V2017.02.4 -
SiemensNucleus Source Code 0 ~ * -
SiemensTALON TC Compact (BACnet) 0 ~ V3.5.7 -
SiemensTALON TC Modular (BACnet) 0 ~ V3.5.7 -
II. Public POCs for CVE-2022-38371
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2022-38371
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-38371

No comments yet


Leave a comment