{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T15:57:04.035","vulnerabilities":[{"cve":{"id":"CVE-2022-45937","sourceIdentifier":"productcert@siemens.com","published":"2022-12-13T16:15:24.893","lastModified":"2024-11-21T07:30:00.073","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet) (All versions < V3.5.5). A low privilege authenticated attacker with network access to the integrated web server could download sensitive information from the device containing user account credentials."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en:\nAPOGEE PXC Compact (BACnet) (Todas las versiones &lt; V3.5.5), \nAPOGEE PXC Compact (P2 Ethernet) (Todas las versiones &lt; V2.8.20), \nAPOGEE PXC Modular (BACnet) (Todas las versiones &lt; V3.5.5), \nAPOGEE PXC Modular (P2 Ethernet) (Todas las versiones &lt; V2.8.20), \nTALON TC Compact (BACnet) (Todas las versiones &lt; V3.5.5), \nTALON TC Modular (BACnet) (Todas las versiones &lt; V3 .5.5). \nUn atacante autenticado con privilegios bajos y acceso a la red del servidor web integrado podría descargar información confidencial del dispositivo que contenga las credenciales de la cuenta de usuario."}],"metrics":{"cvssMetricV31":[{"source":"productcert@siemens.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-284"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:pxc00-e96.a_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.5","matchCriteriaId":"36D6C5AE-A54D-40D3-8FDB-9AEC7BB67509"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:pxc00-e96.a:-:*:*:*:*:*:*:*","matchCriteriaId":"6B2624AC-FC87-4B7E-89B0-972161B87CCC"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:pxc100-e96.a_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.5","matchCriteriaId":"084EC3F3-9BA9-49ED-B04A-743ED81BCC74"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:pxc100-e96.a:-:*:*:*:*:*:*:*","matchCriteriaId":"17095896-BE92-40F2-9A56-068F7809A2B8"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:pxx-485.3_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.5","matchCriteriaId":"ADC7B13D-B952-43A1-B008-E9636D78A838"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:pxx-485.3:-:*:*:*:*:*:*:*","matchCriteriaId":"4978F643-D24A-49C7-B5A0-A1A7D8D7D5A8"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:pxc16.2-pe.a_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.8.20","matchCriteriaId":"7437B8B9-D3DD-4C2C-AE21-2195FE30BD77"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:pxc16.2-pe.a:-:*:*:*:*:*:*:*","matchCriteriaId":"DBCBEA25-E09B-4FAF-A168-9141A84C711D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:pxc24.2-pe.a_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.8.20","matchCriteriaId":"493C8A07-DBD7-40CA-B4EE-AF508FB4C67A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:pxc24.2-pe.a:-:*:*:*:*:*:*:*","matchCriteriaId":"2CC32D0E-F2AB-4DA5-A191-05EDDF71DEB3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:pxc24.2-pef.a_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.8.20","matchCriteriaId":"DFF0FB32-E711-4452-AD95-E101863C618F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:pxc24.2-pef.a:-:*:*:*:*:*:*:*","matchCriteriaId":"B36804FA-89A9-4696-B255-800FC6AF7592"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:pxc24.2-per.a_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.8.20","matchCriteriaId":"0D247CB1-730F-44C1-AD2C-F770981A42B6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:pxc24.2-per.a:-:*:*:*:*:*:*:*","matchCriteriaId":"BC5CD83F-1971-47BE-8144-7FD8BACD7149"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:pxc24.2-perf.a_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.8.20","matchCriteriaId":"B3830835-7A93-4279-8FEC-1D4ABF968AC5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:pxc24.2-perf.a:-:*:*:*:*:*:*:*","matchCriteriaId":"8058F06A-2C05-4109-ACB0-F41701D76648"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:talon_tc_modular_\\(bacnet\\)_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.5","matchCriteriaId":"283C1476-EACB-4644-817D-979246092BBE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:talon_tc_modular_\\(bacnet\\):-:*:*:*:*:*:*:*","matchCriteriaId":"2ECD8AD9-E206-41B5-8CD4-F39DA3B4CE05"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf","source":"productcert@siemens.com","tags":["Patch","Vendor Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-180579.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}