CVE-2021-31882
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.19), APOGEE PXC Modular (BACnet) (All versions < V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.19), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC00-U (All versions >= V2.3 and < V6.30.016), Desigo PXC001-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC100-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC12-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC128-U (All versions >= V2.3 and < V6.30.016), Desigo PXC200-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC36.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC50-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC64-U (All versions >= V2.3 and < V6.30.016), Desigo PXM20-E (All versions >= V2.3 and < V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions < V3.5.4), TALON TC Modular (BACnet) (All versions < V3.5.4). The DHCP client application does not validate the length of the Domain Name Server IP option(s) (0x06) when processing DHCP ACK packets. This may lead to Denial-of-Service conditions. (FSMD-2021-0011)
Se ha identificado una vulnerabilidad en APOGEE MBC (PPC) (BACnet) (Todas las versiones), APOGEE MBC (PPC) (P2 Ethernet) (Todas las versiones), APOGEE MEC (PPC) (BACnet) (Todas las versiones), APOGEE MEC (PPC) (P2 Ethernet) (Todas las versiones), APOGEE PXC Compact (BACnet) (Todas las versiones anteriores a V3. 5.4), APOGEE PXC Compact (P2 Ethernet) (Todas las versiones anteriores a V2.8.19), APOGEE PXC Modular (BACnet) (Todas las versiones anteriores a V3. 5.4), APOGEE PXC Modular (P2 Ethernet) (Todas las versiones anteriores a V2.8.19), Capital VSTAR (Todas las versiones con opciones de Ethernet habilitadas), Desigo PXC00-E.D (Todas las versiones posteriores o iguales V2.3 y anteriores a V6. 30.016), Desigo PXC00-U (Todas las versiones posteriores o iguales V2.3 y anteriores a V6.30.016), Desigo PXC001-E.D (Todas las versiones posteriores o iguales V2.3 y anteriores a V6.30.016), Desigo PXC100-E.D (Todas las versiones posteriores o iguales V2.3 y anteriores a V6.30. 016), Desigo PXC12-E.D (Todas las versiones posteriores o iguales V2.3 y anteriores a V6.30.016), Desigo PXC128-U (Todas las versiones posteriores o iguales V2.3 y anteriores a V6.30.016), Desigo PXC200-E.D (Todas las versiones posteriores o iguales V2.3 y anteriores a V6.30.016), Desigo PXC22-E. D (Todas las versiones posteriores o iguales V2.3 y anteriores a V6.30.016), Desigo PXC22.1-E.D (Todas las versiones posteriores o iguales V2.3 y anteriores a V6.30.016), Desigo PXC36.1-E.D (Todas las versiones posteriores o iguales V2.3 y anteriores a V6.30.016), Desigo PXC50-E. D (Todas las versiones posteriores o iguales V2.3 y anteriores a V6.30.016), Desigo PXC64-U (Todas las versiones posteriores o iguales V2.3 y anteriores a V6.30.016), Desigo PXM20-E (Todas las versiones posteriores o iguales V2.3 y anteriores a V6.30. 016), Nucleus NET (Todas las versiones), Nucleus ReadyStart V3 (Todas las versiones anteriores a V2017.02.4), Nucleus Source Code (Todas las versiones), TALON TC Compact (BACnet) (Todas las versiones anteriores a V3.5.4), TALON TC Modular (BACnet) (Todas las versiones anteriores a V3.5.4). La aplicación cliente DHCP no valida la longitud de la(s) opción(es) IP del Servidor de Nombres de Dominio (0x06) al procesar los paquetes DHCP ACK. Esto puede provocar condiciones de denegación de servicio. (FSMD-2021-0011)
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303). The DHCP client application does not validate the length of the Domain Name Server IP option(s) (0x06) when processing DHCP ACK packets. This may lead to Denial-of-Service conditions. (FSMD-2021-0011)
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-04-29 CVE Reserved
- 2021-11-09 CVE Published
- 2024-10-08 CVE Updated
- 2024-10-09 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (6)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf | 2022-05-20 | |
https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf | 2022-05-20 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Siemens Search vendor "Siemens" | Apogee Modular Building Controller Firmware Search vendor "Siemens" for product "Apogee Modular Building Controller Firmware" | * | - |
Affected
| in | Siemens Search vendor "Siemens" | Apogee Modular Building Controller Search vendor "Siemens" for product "Apogee Modular Building Controller" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Apogee Modular Equiment Controller Firmware Search vendor "Siemens" for product "Apogee Modular Equiment Controller Firmware" | * | - |
Affected
| in | Siemens Search vendor "Siemens" | Apogee Modular Equiment Controller Search vendor "Siemens" for product "Apogee Modular Equiment Controller" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Apogee Pxc Compact Firmware Search vendor "Siemens" for product "Apogee Pxc Compact Firmware" | * | - |
Affected
| in | Siemens Search vendor "Siemens" | Apogee Pxc Compact Search vendor "Siemens" for product "Apogee Pxc Compact" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Apogee Pxc Modular Firmware Search vendor "Siemens" for product "Apogee Pxc Modular Firmware" | * | - |
Affected
| in | Siemens Search vendor "Siemens" | Apogee Pxc Modular Search vendor "Siemens" for product "Apogee Pxc Modular" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Talon Tc Compact Firmware Search vendor "Siemens" for product "Talon Tc Compact Firmware" | * | - |
Affected
| in | Siemens Search vendor "Siemens" | Talon Tc Compact Search vendor "Siemens" for product "Talon Tc Compact" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Talon Tc Modular Firmware Search vendor "Siemens" for product "Talon Tc Modular Firmware" | * | - |
Affected
| in | Siemens Search vendor "Siemens" | Talon Tc Modular Search vendor "Siemens" for product "Talon Tc Modular" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Capital Vstar Search vendor "Siemens" for product "Capital Vstar" | * | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Nucleus Net Search vendor "Siemens" for product "Nucleus Net" | * | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Nucleus Readystart V3 Search vendor "Siemens" for product "Nucleus Readystart V3" | < 2017.02.1 Search vendor "Siemens" for product "Nucleus Readystart V3" and version " < 2017.02.1" | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Nucleus Source Code Search vendor "Siemens" for product "Nucleus Source Code" | * | - |
Affected
|