Versio.io

CVE-2021-31881

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 09-11-2021 01:15
Last modified: - 20-05-2022 03:15
Total changes: - 4

Description

A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.19), APOGEE PXC Modular (BACnet) (All versions < V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.19), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC00-U (All versions >= V2.3 and < V6.30.016), Desigo PXC001-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC100-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC12-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC128-U (All versions >= V2.3 and < V6.30.016), Desigo PXC200-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC36.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC50-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC64-U (All versions >= V2.3 and < V6.30.016), Desigo PXM20-E (All versions >= V2.3 and < V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions < V3.5.4), TALON TC Modular (BACnet) (All versions < V3.5.4). When processing a DHCP OFFER message, the DHCP client application does not validate the length of the Vendor option(s), leading to Denial-of-Service conditions. (FSMD-2021-0008)

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Low
Attack complexity
Network
Attack vector
High
Availability
None
Confidentiality
None
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
7.5
Base score
3.9
3.6
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=siemens AND product=nucleus_source_code
vendor=siemens AND product=nucleus_net
vendor=siemens AND product=capital_vstar
vendor=siemens AND product=nucleus_readystart_v3 AND versionEndExcluding=2012.08
AND
OR
vendor=siemens AND product=apogee_modular_building_controller_firmware
OR
vendor=siemens AND product=apogee_modular_building_controller AND version=-
AND
OR
vendor=siemens AND product=apogee_modular_equiment_controller_firmware
OR
vendor=siemens AND product=apogee_modular_equiment_controller AND version=-
AND
OR
vendor=siemens AND product=apogee_pxc_compact_firmware
OR
vendor=siemens AND product=apogee_pxc_compact AND version=-
AND
OR
vendor=siemens AND product=apogee_pxc_modular_firmware
OR
vendor=siemens AND product=apogee_pxc_modular AND version=-
AND
OR
vendor=siemens AND product=talon_tc_compact_firmware
OR
vendor=siemens AND product=talon_tc_compact AND version=-
AND
OR
vendor=siemens AND product=talon_tc_modular_firmware
OR
vendor=siemens AND product=talon_tc_modular AND version=-
 

Reference

 


Keywords

NVD

 

CVE-2021-31881

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.