The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-31886

CVE-2021-31886: Siemens Nucleus Net RCE Vulnerability

CVE-2021-31886 is a remote code execution vulnerability in Siemens Nucleus Net caused by improper FTP server validation. Attackers can exploit stack-based buffer overflows to execute arbitrary code or cause denial of service.

Published: February 25, 2026

CVE-2021-31886 Overview

A critical stack-based buffer overflow vulnerability has been identified in the FTP server component of Siemens Nucleus Real-Time Operating System (RTOS) and multiple building automation products. The vulnerability exists because the FTP server fails to properly validate the length of the "USER" command, allowing remote attackers to overflow stack buffers. Successful exploitation can result in Denial-of-Service conditions and Remote Code Execution on affected devices.

This vulnerability affects a wide range of Siemens industrial control and building automation systems, including the Nucleus NET TCP/IP stack, APOGEE building controllers, Desigo PXC automation stations, and TALON terminal controllers. The affected products are commonly deployed in critical infrastructure environments including commercial buildings, hospitals, and industrial facilities for HVAC control, fire safety, and building management.

Critical Impact

Remote attackers can achieve code execution on vulnerable building automation controllers and industrial systems without authentication, potentially compromising critical infrastructure operations.

Affected Products

  • Siemens Nucleus NET (All versions)
  • Siemens Nucleus ReadyStart V3 (All versions < V2017.02.4)
  • Siemens Nucleus Source Code (All versions)
  • Siemens APOGEE MBC (PPC) BACnet/P2 Ethernet (All versions)
  • Siemens APOGEE MEC (PPC) BACnet/P2 Ethernet (All versions)
  • Siemens APOGEE PXC Compact (BACnet versions < V3.5.4, P2 Ethernet versions < V2.8.19)
  • Siemens APOGEE PXC Modular (BACnet versions < V3.5.4, P2 Ethernet versions < V2.8.19)
  • Siemens Desigo PXC Series (versions >= V2.3 and < V6.30.016)
  • Siemens Desigo PXM20-E (versions >= V2.3 and < V6.30.016)
  • Siemens TALON TC Compact/Modular BACnet (versions < V3.5.4)

Discovery Timeline

  • November 9, 2021 - CVE-2021-31886 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2021-31886

Vulnerability Analysis

The vulnerability resides in the FTP server implementation within the Siemens Nucleus RTOS networking stack. When processing FTP authentication requests, the server accepts the "USER" command followed by a username string. The vulnerable code fails to perform adequate bounds checking on the length of this username input before copying it to a fixed-size stack buffer.

This improper input validation allows an attacker to supply an excessively long username string that exceeds the allocated buffer space. The overflow corrupts adjacent stack memory, including saved return addresses and other critical control data. By carefully crafting the overflow payload, attackers can redirect program execution to attacker-controlled code.

The vulnerability is particularly severe because FTP servers on these devices may be accessible over the network without authentication—the exploit occurs during the authentication phase before any credentials are validated. The affected devices are embedded systems used in building automation and industrial control, where compromise could affect physical safety systems.

Root Cause

The root cause is classified under CWE-787 (Out-of-bounds Write) and CWE-170 (Improper Null Termination). The FTP server's command parser does not enforce maximum length restrictions on the USER command parameter. When a username string longer than the internal buffer is received, a memory copy operation writes beyond the buffer's allocated space on the stack. Additionally, improper handling of string termination contributes to the overflow condition, as the code may continue processing or copying data past intended boundaries.

Attack Vector

The attack vector is network-based, requiring no authentication or user interaction. An attacker with network access to the FTP service (typically TCP port 21) on a vulnerable device can exploit this vulnerability by:

  1. Establishing a TCP connection to the FTP server on the target device
  2. Sending a specially crafted FTP USER command with an oversized username parameter
  3. The malformed input triggers a stack buffer overflow during command processing
  4. The overflow allows overwriting the return address on the stack
  5. When the function returns, execution redirects to attacker-controlled shellcode

The attack can be performed using standard FTP client tools or custom scripts. Since the vulnerability occurs before authentication, any network-reachable FTP service is vulnerable regardless of configured credentials.

Detection Methods for CVE-2021-31886

Indicators of Compromise

  • Unusual network traffic to FTP ports (TCP/21) on building automation controllers and embedded systems
  • FTP connection attempts followed by abnormally large USER command packets (exceeding typical username lengths)
  • Unexpected device reboots or service crashes on APOGEE, Desigo, or TALON controllers
  • Anomalous outbound network connections from building automation systems
  • Changes to device configurations or firmware without authorized administrative action

Detection Strategies

  • Implement network intrusion detection signatures for oversized FTP USER commands targeting Siemens devices
  • Monitor FTP traffic patterns for authentication attempts with username parameters exceeding 256 bytes
  • Deploy industrial control system (ICS) network monitoring to detect unauthorized FTP access attempts
  • Configure SentinelOne Singularity to monitor network endpoints for exploitation attempts against industrial and IoT devices
  • Establish behavioral baselines for building automation controllers and alert on deviations

Monitoring Recommendations

  • Enable detailed logging on network firewalls for all FTP traffic to/from building automation network segments
  • Implement network segmentation monitoring between IT and OT/BAS networks
  • Configure SIEM correlation rules to detect patterns of failed or anomalous FTP authentications
  • Establish continuous vulnerability scanning for Siemens devices in the environment
  • Monitor vendor security portals for updated advisories and patches

How to Mitigate CVE-2021-31886

Immediate Actions Required

  • Disable FTP services on affected devices if not operationally required
  • Implement network segmentation to restrict access to building automation networks from untrusted zones
  • Deploy firewall rules blocking FTP traffic (TCP/21) to vulnerable devices from unauthorized sources
  • Conduct an inventory of all Siemens Nucleus-based products in the environment
  • Review Siemens Security Advisory SSA-044112 and SSA-114589 for product-specific guidance

Patch Information

Siemens has released firmware updates that address this vulnerability. Organizations should upgrade affected products to the following minimum versions:

  • Nucleus ReadyStart V3: Update to V2017.02.4 or later
  • APOGEE PXC Compact (BACnet): Update to V3.5.4 or later
  • APOGEE PXC Compact (P2 Ethernet): Update to V2.8.19 or later
  • APOGEE PXC Modular (BACnet): Update to V3.5.4 or later
  • APOGEE PXC Modular (P2 Ethernet): Update to V2.8.19 or later
  • Desigo PXC/PXM Series: Update to V6.30.016 or later
  • TALON TC Compact/Modular (BACnet): Update to V3.5.4 or later

For legacy products (APOGEE MBC/MEC PPC series) and Nucleus NET/Source Code products where patches may not be available, contact Siemens support for migration or mitigation guidance. Full patch details are available in the Siemens Security Advisory SSA-044112.

Workarounds

  • Disable FTP server functionality on affected devices where the feature is not required for operations
  • Implement strict network access controls limiting FTP access to specific trusted management stations
  • Deploy application-layer firewalls or deep packet inspection to filter malformed FTP commands
  • Use VPN or other encrypted tunnels for any required remote access to building automation networks
  • Consider alternative secure protocols (SFTP, SCP) for file transfers if supported by the devices
bash
# Example firewall rule to block external FTP access to BAS network segment
# Adjust IP ranges according to your network topology

# iptables example - block FTP from untrusted zones
iptables -A FORWARD -p tcp --dport 21 -d 10.10.50.0/24 -j DROP
iptables -A FORWARD -p tcp --dport 21 -s 10.10.100.5 -d 10.10.50.0/24 -j ACCEPT

# Network segmentation - allow only authorized management stations
# Replace 10.10.100.5 with your authorized management workstation IP
# Replace 10.10.50.0/24 with your building automation network segment

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechSiemens Nucleus Net

  • SeverityCRITICAL

  • CVSS Score9.8

  • EPSS Probability3.43%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-170

  • CWE-787
  • Vendor Resources
  • Siemens Security Advisory SSA-044112

  • Siemens Security Advisory SSA-114589
  • Latest CVEs
  • CVE-2025-52479: HTTP.jl & URIs.jl CRLF Injection Flaw

  • CVE-2026-31740: Linux Kernel Race Condition Vulnerability

  • CVE-2026-31743: Linux Kernel Buffer Overflow Vulnerability

  • CVE-2026-31744: Linux Kernel NULL Pointer Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English