A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus Source Code (All versions). By sending specially crafted DHCP packets to a device where the DHCP client is enabled, an attacker could change the IP address of the device to an invalid value.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/html/ssa-162506.html | |
https://cert-portal.siemens.com/productcert/html/ssa-434032.html | |
https://cert-portal.siemens.com/productcert/pdf/ssa-162506.pdf | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-434032.pdf | Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-20-105-06 | Third Party Advisory US Government Resource |
https://cert-portal.siemens.com/productcert/html/ssa-162506.html | |
https://cert-portal.siemens.com/productcert/html/ssa-434032.html | |
https://cert-portal.siemens.com/productcert/pdf/ssa-162506.pdf | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-434032.pdf | Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-20-105-06 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
Configuration 19 (hide)
AND |
|
Configuration 20 (hide)
AND |
|
Configuration 21 (hide)
AND |
|
History
21 Nov 2024, 04:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/html/ssa-162506.html - | |
References | () https://cert-portal.siemens.com/productcert/html/ssa-434032.html - | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-162506.pdf - Vendor Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-434032.pdf - Vendor Advisory | |
References | () https://us-cert.cisa.gov/ics/advisories/icsa-20-105-06 - Third Party Advisory, US Government Resource |
13 Feb 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus Source Code (All versions). By sending specially crafted DHCP packets to a device where the DHCP client is enabled, an attacker could change the IP address of the device to an invalid value. | |
References |
|
|
CWE | CWE-20 |
09 May 2023, 16:27
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-20-105-06 - Third Party Advisory, US Government Resource | |
First Time |
Siemens desigo Pxc12-e.d
Siemens desigo Pxc12-e.d Firmware Siemens desigo Pxc36.1-e.d Firmware Siemens desigopxc128-u Siemens desigo Pxc001-e.d Siemens desigo Pxc00-e.d Siemens desigopxc200-e.d Firmware Siemens desigopxc64-u Firmware Siemens desigopxm20-e Siemens desigopxc100-e.d Siemens desigopxc50-e.d Firmware Siemens desigopxc100-e.d Firmware Siemens desigo Pxc001-e.d Firmware Siemens desigo Pxc22-e.d Siemens desigopxm20-e Firmware Siemens desigo Pxc22.1-e.d Siemens desigo Pxc36.1-e.d Siemens desigo Pxc22.1-e.d Firmware Siemens desigo Pxc00-u Firmware Siemens desigopxc64-u Siemens desigopxc200-e.d Siemens desigo Pxc00-u Siemens desigo Pxc22-e.d Firmware Siemens desigopxc50-e.d Siemens desigopxc128-u Firmware Siemens desigo Pxc00-e.d Firmware |
|
CPE | cpe:2.3:h:siemens:desigopxc50-e.d:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:desigopxc64-u:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:desigo_pxc22-e.d:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:desigo_pxc36.1-e.d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:desigopxc128-u_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:desigopxc100-e.d_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:desigo_pxc12-e.d:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:desigo_pxc001-e.d:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:desigo_pxc001-e.d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:desigo_pxc00-u_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:desigo_pxc36.1-e.d:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:desigo_pxc12-e.d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:desigo_pxc22-e.d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:desigo_pxc22.1-e.d_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:desigo_pxc00-e.d_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:desigo_pxc00-e.d:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:desigopxc200-e.d_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:desigopxc128-u:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:desigopxc50-e.d_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:desigo_pxc00-u:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:desigopxc64-u_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:desigopxm20-e:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:desigopxc100-e.d:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:desigopxc200-e.d:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:desigo_pxc22.1-e.d:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:desigopxm20-e_firmware:-:*:*:*:*:*:*:* |
Information
Published : 2020-01-16 16:15
Updated : 2025-03-11 10:15
NVD link : CVE-2019-13939
Mitre link : CVE-2019-13939
CVE.ORG link : CVE-2019-13939
JSON object : View
Products Affected
siemens
- desigo_pxc00-u_firmware
- desigopxm20-e
- desigo_pxc36.1-e.d_firmware
- nucleus_readystart
- desigo_pxc00-u
- nucleus_source_code
- apogee_modular_equiment_controller_firmware
- desigo_pxc22.1-e.d_firmware
- desigo_pxc001-e.d
- desigo_pxc36.1-e.d
- desigopxc50-e.d_firmware
- nucleus_safetycert
- talon_tc_firmware
- apogee_pxc_firmware
- desigopxm20-e_firmware
- desigo_pxc001-e.d_firmware
- nucleus_rtos
- desigo_pxc00-e.d
- desigo_pxm20_firmware
- apogee_modular_building_controller
- desigopxc50-e.d
- desigo_pxm20
- desigopxc100-e.d_firmware
- simotics_connect_400_firmware
- simotics_connect_400
- desigopxc200-e.d_firmware
- desigopxc128-u
- desigo_pxc00-e.d_firmware
- desigo_pxc
- talon_tc
- desigo_pxc22-e.d
- apogee_modular_building_controller_firmware
- capital_vstar
- apogee_modular_equiment_controller
- desigo_pxc22.1-e.d
- desigo_pxc_firmware
- desigopxc64-u
- desigo_pxc22-e.d_firmware
- desigopxc100-e.d
- desigo_pxc12-e.d_firmware
- nucleus_net
- desigo_pxc12-e.d
- desigopxc128-u_firmware
- desigopxc200-e.d
- desigopxc64-u_firmware
- apogee_pxc
CWE