Critical CVE-2021-41545 affects Siemens' Desigo DXR2, PXC3, PXC4, PXC5 controllers, causing 'factory reset' due to BACnet protocol packet. Learn impact, mitigation, and prevention.
A vulnerability in Siemens' Desigo DXR2, Desigo PXC3, Desigo PXC4, and Desigo PXC5 controllers could lead to a 'factory reset' state when receiving a specific BACnet protocol packet.
Understanding CVE-2021-41545
This CVE identifies a critical vulnerability in Siemens' building automation controllers.
What is CVE-2021-41545?
The vulnerability affects multiple Siemens products, leading to a 'factory reset' state due to an exception triggered by a specific BACnet protocol packet.
The Impact of CVE-2021-41545
The vulnerability can result in a loss of control and significant disruptions to building automation systems, potentially causing downtime and operational issues.
Technical Details of CVE-2021-41545
Siemens' controllers are vulnerable to an uncaught exception when receiving a specific BACnet protocol packet.
Vulnerability Description
When the affected controllers encounter the specified packet, it leads to an 'out of work' state, potentially causing a 'factory reset' operation.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability is exploited through the reception of a specific BACnet protocol packet, triggering an unhandled exception that disrupts normal operation.
Mitigation and Prevention
Immediate Steps to Take:
Long-Term Security Practices:
Patching and Updates: Siemens has released patched versions to address the vulnerability. It is crucial to apply these updates promptly to ensure the security of the affected systems.