Cyber Posture

CVE-2024-54089

High

Published: 11 February 2025

Published
11 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0003 9.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-54089 is a high-severity Inadequate Encryption Strength (CWE-326) vulnerability. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 9.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-12 (Cryptographic Key Establishment and Management) and SC-13 (Cryptographic Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires implementation of organization-defined cryptographic mechanisms for protecting sensitive information like passwords, directly mitigating the weak encryption with hard-coded key used in this CVE.

prevent

Mandates establishment and management of cryptographic keys, preventing reliance on hard-coded keys that enable password decryption as exploited in this vulnerability.

prevent

Protects confidentiality of transmitted information, countering remote attackers capturing and decrypting ciphertext containing passwords over the network.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

Vulnerability in network-exposed controllers enables remote exploitation (T1190) and direct decryption of credentials via hardcoded weak encryption (T1552).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability has been identified in APOGEE PXC Series (BACnet) (All versions), APOGEE PXC Series (P2 Ethernet) (All versions), TALON TC Series (BACnet) (All versions). Affected devices contain a weak encryption mechanism based on a hard-coded key. This could allow…

more

an attacker to guess or decrypt the password from the cyphertext.

Deeper analysisAI

CVE-2024-54089 is a vulnerability in all versions of Siemens APOGEE PXC Series (BACnet), APOGEE PXC Series (P2 Ethernet), and TALON TC Series (BACnet) building controllers. These affected devices implement a weak encryption mechanism based on a hard-coded key, which enables attackers to guess or decrypt passwords from ciphertext. The issue is classified under CWE-326 (Inadequate Encryption Strength) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to significant confidentiality impact.

A remote, unauthenticated attacker with network access can exploit this vulnerability with low attack complexity and no user interaction. Exploitation involves capturing ciphertext from the device and using the known hard-coded key to decrypt stored or transmitted passwords, potentially granting access to device configurations or controls in building automation systems.

Siemens has published security advisory SSA-615116 at https://cert-portal.siemens.com/productcert/html/ssa-615116.html, which details the vulnerability and affected products.

Details

CWE(s)

Affected Products

All
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-28377Shared CWE-326
CVE-2025-36379Shared CWE-326
CVE-2026-33488Shared CWE-326
CVE-2025-68703Shared CWE-326
CVE-2018-25272Shared CWE-326
CVE-2026-33512Shared CWE-326

References