CVE-2019-13939
Published on: 01/16/2020 12:00:00 AM UTC
Last Modified on: 05/09/2023 04:27:00 PM UTC
Certain versions of Apogee Modular Building Controller from Siemens contain the following vulnerability:
A vulnerability has been identified in APOGEE MEC/MBC/PXC (P2) (All versions < V2.8.2), APOGEE PXC Series (BACnet) (All versions < V3.5.3), APOGEE PXC Series (P2) (All versions >= V2.8.2 and < V2.8.19), Desigo PXC00-E.D (All versions >= V2.3x and < V6.00.327), Desigo PXC00-U (All versions >= V2.3x and < V6.00.327), Desigo PXC001-E.D (All versions >= V2.3x and < V6.00.327), Desigo PXC100-E.D (All versions >= V2.3x and < V6.00.327), Desigo PXC12-E.D (All versions >= V2.3x and < V6.00.327), Desigo PXC128-U (All versions >= V2.3x and < V6.00.327), Desigo PXC200-E.D (All versions >= V2.3x and < V6.00.327), Desigo PXC22-E.D (All versions >= V2.3x and < V6.00.327), Desigo PXC22.1-E.D (All versions >= V2.3x and < V6.00.327), Desigo PXC36.1-E.D (All versions >= V2.3x and < V6.00.327), Desigo PXC50-E.D (All versions >= V2.3x and < V6.00.327), Desigo PXC64-U (All versions >= V2.3x and < V6.00.327), Desigo PXM20-E (All versions >= V2.3x and < V6.00.327), Nucleus NET (All versions), Nucleus RTOS (All versions), Nucleus ReadyStart for ARM, MIPS, and PPC (All versions < V2017.02.2 with patch "Nucleus 2017.02.02 Nucleus NET Patch"), Nucleus SafetyCert (All versions), Nucleus Source Code (All versions), SIMOTICS CONNECT 400 (All versions < V0.3.0.330), TALON TC Series (BACnet) (All versions < V3.5.3), VSTAR (All versions). By sending specially crafted DHCP packets to a device where the DHCP client is enabled, an attacker could change the IP address of the device to an invalid value. The vulnerability could affect availability and integrity of the device. Adjacent network access is required, but no authentication and no user interaction is needed to conduct an attack.
- CVE-2019-13939 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
CVSS3 Score: 7.1 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
ADJACENT_NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | LOW | HIGH |
CVSS2 Score: 4.8 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
ADJACENT_NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | PARTIAL | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Siemens SIMOTICS, Desigo, APOGEE, and TALON | CISA | us-cert.cisa.gov text/html |
![]() |
Vendor Advisory cert-portal.siemens.com application/pdf |
![]() | |
Vendor Advisory cert-portal.siemens.com application/pdf |
![]() |
Related QID Numbers
- 590707 Siemens SIMOTICS, Desigo, APOGEE, and TALON (Update B) Vulnerability (ICSA-20-105-06)
Known Affected Configurations (CPE V2.3)
- cpe:2.3:h:siemens:apogee_modular_building_controller:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:apogee_modular_building_controller:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:apogee_modular_building_controller_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:apogee_modular_building_controller_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:apogee_modular_equiment_controller:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:apogee_modular_equiment_controller:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:apogee_modular_equiment_controller_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:apogee_modular_equiment_controller_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:apogee_pxc:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:apogee_pxc:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:apogee_pxc_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:a:siemens:capital_vstar:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:desigopxc100-e.d:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:desigopxc100-e.d_firmware:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:desigopxc128-u:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:desigopxc128-u_firmware:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:desigopxc200-e.d:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:desigopxc200-e.d_firmware:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:desigopxc50-e.d:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:desigopxc50-e.d_firmware:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:desigopxc64-u:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:desigopxc64-u_firmware:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:desigopxm20-e:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:desigopxm20-e_firmware:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:desigo_pxc:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:desigo_pxc:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:desigo_pxc00-e.d:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:desigo_pxc00-e.d_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:desigo_pxc00-u:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:desigo_pxc00-u_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:desigo_pxc001-e.d:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:desigo_pxc001-e.d_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:desigo_pxc12-e.d:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:desigo_pxc12-e.d_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:desigo_pxc22-e.d:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:desigo_pxc22-e.d_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:desigo_pxc22.1-e.d:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:desigo_pxc22.1-e.d_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:desigo_pxc36.1-e.d:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:desigo_pxc36.1-e.d_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:desigo_pxc_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:desigo_pxc_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:desigo_pxm20:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:desigo_pxm20:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:desigo_pxm20_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:desigo_pxm20_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:a:siemens:nucleus_net:*:*:*:*:*:*:*:*:
- cpe:2.3:a:siemens:nucleus_net:*:*:*:*:*:*:*:*:
- cpe:2.3:a:siemens:nucleus_readystart:*:*:*:*:*:*:*:*:
- cpe:2.3:a:siemens:nucleus_readystart:*:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:nucleus_rtos:*:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:nucleus_rtos:*:*:*:*:*:*:*:*:
- cpe:2.3:a:siemens:nucleus_safetycert:*:*:*:*:*:*:*:*:
- cpe:2.3:a:siemens:nucleus_safetycert:*:*:*:*:*:*:*:*:
- cpe:2.3:a:siemens:nucleus_source_code:*:*:*:*:*:*:*:*:
- cpe:2.3:a:siemens:nucleus_source_code:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:simotics_connect_400:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:simotics_connect_400:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:simotics_connect_400_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:talon_tc:-:*:*:*:*:*:*:*:
- cpe:2.3:h:siemens:talon_tc:-:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:talon_tc_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:o:siemens:talon_tc_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:a:siemens:vstar:*:*:*:*:*:*:*:*:
- cpe:2.3:a:siemens:vstar:*:*:*:*:*:*:*:*:
Social Mentions
Source | Title | Posted (UTC) |
---|