ID

VAR-202502-0121


CVE

CVE-2024-54090


TITLE

Siemens APOGEE PXC Series and TALON TC Series (BACnet) Out-of-Bounds Read Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2025-15334

DESCRIPTION

A vulnerability has been identified in APOGEE PXC Series (BACnet) (All versions), APOGEE PXC Series (P2 Ethernet) (All versions), TALON TC Series (BACnet) (All versions). Affected devices contain an out-of-bounds read in the memory dump function. This could allow an attacker with Medium (MED) or higher privileges to cause the device to enter an insecure cold start state. The direct digital controller (DDC) in the Siemens APOGEE PXC Series building automation system is designed for small and medium-sized buildings and has modular expansion capabilities and intelligent control functions. TALON TC Series (BACnet) is a building management system that is mainly used to monitor and control building equipment. The system implements remote management functions through the BACnet protocol and supports real-time monitoring and adjustment of environmental parameters (such as temperature, humidity, etc.) in the building

Trust: 1.44

sources: NVD: CVE-2024-54090 // CNVD: CNVD-2025-15334

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-15334

AFFECTED PRODUCTS

vendor:siemensmodel:apogee pxc seriesscope: - version: -

Trust: 1.2

vendor:siemensmodel:talon tc seriesscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-15334

CVSS

SEVERITY

CVSSV2

CVSSV3

productcert@siemens.com: CVE-2024-54090
value: MEDIUM

Trust: 1.0

CNVD: CNVD-2025-15334
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2025-15334
severity: MEDIUM
baseScore: 5.4
vectorString: AV:N/AC:H/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

productcert@siemens.com: CVE-2024-54090
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2025-15334 // NVD: CVE-2024-54090

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.0

sources: NVD: CVE-2024-54090

EXTERNAL IDS

db:SIEMENSid:SSA-615116

Trust: 1.6

db:NVDid:CVE-2024-54090

Trust: 1.6

db:CNVDid:CNVD-2025-15334

Trust: 0.6

sources: CNVD: CNVD-2025-15334 // NVD: CVE-2024-54090

REFERENCES

url:https://cert-portal.siemens.com/productcert/html/ssa-615116.html

Trust: 1.6

sources: CNVD: CNVD-2025-15334 // NVD: CVE-2024-54090

SOURCES

db:CNVDid:CNVD-2025-15334
db:NVDid:CVE-2024-54090

LAST UPDATE DATE

2025-07-13T23:26:44.664000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-15334date:2025-07-09T00:00:00
db:NVDid:CVE-2024-54090date:2025-02-11T11:15:15.647

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-15334date:2025-02-11T00:00:00
db:NVDid:CVE-2024-54090date:2025-02-11T11:15:15.647