4.8
CVSSv2

CVE-2019-13939

Published: 16/01/2020 Updated: 13/02/2024
CVSS v2 Base Score: 4.8 | Impact Score: 4.9 | Exploitability Score: 6.5
CVSS v3 Base Score: 7.1 | Impact Score: 4.2 | Exploitability Score: 2.8
VMScore: 427
Vector: AV:A/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus Source Code (All versions). By sending specially crafted DHCP packets to a device where the DHCP client is enabled, an attacker could change the IP address of the device to an invalid value.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

siemens nucleus rtos

siemens nucleus readystart

siemens nucleus source code

siemens nucleus safetycert

siemens nucleus net

siemens capital vstar

siemens apogee_modular_equiment_controller_firmware

siemens apogee_modular_building_controller_firmware

siemens apogee_pxc_firmware

siemens desigo_pxc_firmware

siemens desigo_pxm20_firmware

siemens simotics_connect_400_firmware

siemens talon_tc_firmware

siemens desigo_pxc00-e.d_firmware

siemens desigo_pxc00-u_firmware

siemens desigo_pxc001-e.d_firmware

siemens desigo_pxc12-e.d_firmware

siemens desigo_pxc22-e.d_firmware

siemens desigo_pxc22.1-e.d_firmware

siemens desigo_pxc36.1-e.d_firmware

siemens desigopxc50-e.d_firmware -

siemens desigopxc64-u_firmware -

siemens desigopxc100-e.d_firmware -

siemens desigopxc128-u_firmware -

siemens desigopxc200-e.d_firmware -

siemens desigopxm20-e_firmware -