A vulnerability affecting building automation controllers from Siemens can be exploited to disrupt a device for an extended period of time, according to OT and IoT cybersecurity firm Nozomi Networks.
Nozomi researchers recently analyzed Siemens’ PXC4.E16, a programmable building automation system (BAS) of the Desigo family that is designed for HVAC and building service plants.
They discovered that the device, specifically its ABT Site Engineering and Commissioning Tool, is affected by a vulnerability that can be exploited for denial-of-service (DoS) attacks.
The vulnerability has a severity rating of “medium” based on its CVSS score, but cybersecurity experts have often warned that in industrial environments a DoS attack can have a major impact.
The flaw, identified as CVE-2022-24040, is related to the use of the PBKDF2 key derivation function for securing user passwords. A malicious insider or an attacker who has “user profile access” privileges to the tool can create or update an account and cause a DoS condition by attempting to log in to that account.
“The web application fails to enforce an upper bound to the cost factor of the PBKDF2 derived key during the creation or update of an account,” Siemens explained in its advisory. “An attacker with the user profile access privilege could cause a denial of service (DoS) condition through CPU consumption by setting a PBKDF2 derived key with a remarkably high cost effort and then attempting a login to the so-modified account.”
The tests conducted by Nozomi showed that, in a worst-case scenario, an attacker could “make the device unavailable for days just by attempting a login,” and they could repeat the process to further extend the controller’s downtime.
“It is also possible that threat actors can attack BAS while simultaneously launching a catastrophic attack on other industrial control systems (ICS) within a facility. If the fire alarm system or other systems are DDoSed, it could intensify a cyber-physical attack,” Nozomi warned.
Siemens patched the vulnerability this week, along with six other flaws affecting its Desigo PXC and DXR devices.
Related: New Vulnerabilities Can Allow Hackers to Remotely Crash Siemens PLCs
Related: Siemens Addresses Over 90 Vulnerabilities Affecting Third-Party Components
Related: Many IoT Devices Exposed to Attacks Due to Unpatched Flaw in uClibc Library

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- CISA Gets Proactive With New Pre-Ransomware Alerts
- Watch on Demand: Supply Chain & Third-Party Risk Summit Sessions
- TikTok CEO Grilled by Skeptical Lawmakers on Safety, Content
- CISA, NSA Issue Guidance for IAM Administrators
- Analysis: SEC Cybersecurity Proposals and Biden’s National Cybersecurity Strategy
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Cisco Patches High-Severity Vulnerabilities in IOS Software
- ‘Nexus’ Android Trojan Targets 450 Financial Applications
