7.1
CVSSv3

CVE-2019-13939

Published: 16/01/2020 Updated: 13/02/2024
CVSS v2 Base Score: 4.8 | Impact Score: 4.9 | Exploitability Score: 6.5
CVSS v3 Base Score: 7.1 | Impact Score: 4.2 | Exploitability Score: 2.8
VMScore: 427
Vector: AV:A/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus Source Code (All versions). By sending specially crafted DHCP packets to a device where the DHCP client is enabled, an attacker could change the IP address of the device to an invalid value.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

siemens nucleus rtos

siemens nucleus readystart

siemens nucleus source code

siemens nucleus safetycert

siemens nucleus net

siemens capital vstar

siemens apogee modular equiment controller firmware

siemens apogee modular building controller firmware

siemens apogee pxc firmware

siemens desigo pxc firmware

siemens desigo pxm20 firmware

siemens simotics connect 400 firmware

siemens talon tc firmware

siemens desigo pxc00-e.d firmware

siemens desigo pxc00-u firmware

siemens desigo pxc001-e.d firmware

siemens desigo pxc12-e.d firmware

siemens desigo pxc22-e.d firmware

siemens desigo pxc22.1-e.d firmware

siemens desigo pxc36.1-e.d firmware

siemens desigopxc50-e.d firmware -

siemens desigopxc64-u firmware -

siemens desigopxc100-e.d firmware -

siemens desigopxc128-u firmware -

siemens desigopxc200-e.d firmware -

siemens desigopxm20-e firmware -