Versio.io

CVE-2021-31344

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 09-11-2021 01:15
Last modified: - 20-05-2022 03:15
Total changes: - 6

Description

A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.19), APOGEE PXC Modular (BACnet) (All versions < V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.19), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC00-U (All versions >= V2.3 and < V6.30.016), Desigo PXC001-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC100-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC12-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC128-U (All versions >= V2.3 and < V6.30.016), Desigo PXC200-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC36.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC50-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC64-U (All versions >= V2.3 and < V6.30.016), Desigo PXM20-E (All versions >= V2.3 and < V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.1), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), TALON TC Compact (BACnet) (All versions < V3.5.4), TALON TC Modular (BACnet) (All versions < V3.5.4). ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. (FSMD-2021-0004)

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Low
Attack complexity
Network
Attack vector
None
Availability
None
Confidentiality
Low
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
5.3
Base score
3.9
1.4
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=siemens AND product=nucleus_source_code
vendor=siemens AND product=nucleus_net
vendor=siemens AND product=capital_vstar
vendor=siemens AND product=nucleus_readystart_v4 AND versionEndExcluding=4.1.1
vendor=siemens AND product=nucleus_readystart_v3 AND versionEndExcluding=2017.02.1
AND
OR
vendor=siemens AND product=apogee_modular_building_controller_firmware
OR
vendor=siemens AND product=apogee_modular_building_controller AND version=-
AND
OR
vendor=siemens AND product=apogee_modular_equiment_controller_firmware
OR
vendor=siemens AND product=apogee_modular_equiment_controller AND version=-
AND
OR
vendor=siemens AND product=apogee_pxc_compact_firmware
OR
vendor=siemens AND product=apogee_pxc_compact AND version=-
AND
OR
vendor=siemens AND product=apogee_pxc_modular_firmware
OR
vendor=siemens AND product=apogee_pxc_modular AND version=-
AND
OR
vendor=siemens AND product=talon_tc_compact_firmware
OR
vendor=siemens AND product=talon_tc_compact AND version=-
AND
OR
vendor=siemens AND product=talon_tc_modular_firmware
OR
vendor=siemens AND product=talon_tc_modular AND version=-
 

Reference

 


Keywords

NVD

 

CVE-2021-31344

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.