// For flags

CVE-2021-31890

 

Severity Score

9.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.19), APOGEE PXC Modular (BACnet) (All versions < V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.19), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC00-U (All versions >= V2.3 and < V6.30.016), Desigo PXC001-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC100-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC12-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC128-U (All versions >= V2.3 and < V6.30.016), Desigo PXC200-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC36.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC50-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC64-U (All versions >= V2.3 and < V6.30.016), Desigo PXM20-E (All versions >= V2.3 and < V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.1), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), TALON TC Compact (BACnet) (All versions < V3.5.4), TALON TC Modular (BACnet) (All versions < V3.5.4). The total length of an TCP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0017)

Se ha identificado una vulnerabilidad en APOGEE MBC (PPC) (BACnet) (Todas las versiones), APOGEE MBC (PPC) (P2 Ethernet) (Todas las versiones), APOGEE MEC (PPC) (BACnet) (Todas las versiones), APOGEE MEC (PPC) (P2 Ethernet) (Todas las versiones), APOGEE PXC Compact (BACnet) (Todas las versiones anteriores a V3. 5.4), APOGEE PXC Compact (P2 Ethernet) (Todas las versiones anteriores a V2.8.19), APOGEE PXC Modular (BACnet) (Todas las versiones anteriores a V3.5. 4), APOGEE PXC Modular (P2 Ethernet) (Todas las versiones anteriores a V2.8.19), Capital VSTAR (Todas las versiones con opciones de Ethernet activadas), Desigo PXC00-E.D (Todas las versiones posteriores o iguales a V2.3 y anteriores a V6.30.016), Desigo PXC00-U (Todas las versiones posteriores o iguales a V2. 3 y anteriores a V6.30.016), Desigo PXC001-E.D (Todas las versiones posteriores o iguales a V2.3 y anteriores a V6.30.016), Desigo PXC100-E.D (Todas las versiones posteriores o iguales a V2.3 y anteriores a V6.30.016), Desigo PXC12-E.D (Todas las versiones posteriores o iguales a V2.3 y anteriores a V6.30. 016), Desigo PXC128-U (Todas las versiones posteriores o iguales a V2.3 y anteriores a V6.30.016), Desigo PXC200-E.D (Todas las versiones posteriores o iguales a V2.3 y anteriores a V6.30.016), Desigo PXC22-E.D (Todas las versiones posteriores o iguales a V2.3 y anteriores a V6.30.016), Desigo PXC22.1-E. D (Todas las versiones posteriores o iguales a V2.3 y anteriores a V6.30.016), Desigo PXC36.1-E.D (Todas las versiones posteriores o iguales a V2.3 y anteriores a V6.30.016), Desigo PXC50-E.D (Todas las versiones posteriores o iguales a V2.3 y anteriores a V6.30.016), Desigo PXC64-U (Todas las versiones posteriores o iguales a V2.3 y anteriores a V6.30. 016), Desigo PXM20-E (Todas las versiones posteriores o iguales a V2.3 y anteriores a V6.30.016), Nucleus NET (Todas las versiones), Nucleus ReadyStart V3 (Todas las versiones anteriores a V2017.02.4), Nucleus ReadyStart V4 (Todas las versiones anteriores a V4.1. 1), Nucleus Source Code (Todas las versiones), PLUSCONTROL 1st Gen (Todas las versiones), SIMOTICS CONNECT 400 (Todas las versiones anteriores a V0.5.0.0), TALON TC Compact (BACnet) (Todas las versiones anteriores a V3.5.4), TALON TC Modular (BACnet) (Todas las versiones anteriores a V3.5.4). La longitud total de una carga útil TCP (establecida en la cabecera IP) no está marcada. Esto puede conducir a varios efectos secundarios, incluyendo la fuga de información y las condiciones de denegación de servicio, dependiendo de la organización del buffer de red en la memoria. (FSMD-2021-0017)

A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions < V1.0.0.0). The total length of an TCP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0017)

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-04-29 CVE Reserved
  • 2021-11-09 CVE Published
  • 2024-10-08 CVE Updated
  • 2024-10-09 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-240: Improper Handling of Inconsistent Structural Elements
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Apogee Modular Building Controller Firmware
Search vendor "Siemens" for product "Apogee Modular Building Controller Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Apogee Modular Building Controller
Search vendor "Siemens" for product "Apogee Modular Building Controller"
--
Safe
Siemens
Search vendor "Siemens"
Apogee Modular Equiment Controller Firmware
Search vendor "Siemens" for product "Apogee Modular Equiment Controller Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Apogee Modular Equiment Controller
Search vendor "Siemens" for product "Apogee Modular Equiment Controller"
--
Safe
Siemens
Search vendor "Siemens"
Apogee Pxc Compact Firmware
Search vendor "Siemens" for product "Apogee Pxc Compact Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Apogee Pxc Compact
Search vendor "Siemens" for product "Apogee Pxc Compact"
--
Safe
Siemens
Search vendor "Siemens"
Apogee Pxc Modular Firmware
Search vendor "Siemens" for product "Apogee Pxc Modular Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Apogee Pxc Modular
Search vendor "Siemens" for product "Apogee Pxc Modular"
--
Safe
Siemens
Search vendor "Siemens"
Talon Tc Compact Firmware
Search vendor "Siemens" for product "Talon Tc Compact Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Talon Tc Compact
Search vendor "Siemens" for product "Talon Tc Compact"
--
Safe
Siemens
Search vendor "Siemens"
Talon Tc Modular Firmware
Search vendor "Siemens" for product "Talon Tc Modular Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Talon Tc Modular
Search vendor "Siemens" for product "Talon Tc Modular"
--
Safe
Siemens
Search vendor "Siemens"
Capital Vstar
Search vendor "Siemens" for product "Capital Vstar"
*-
Affected
Siemens
Search vendor "Siemens"
Nucleus Net
Search vendor "Siemens" for product "Nucleus Net"
*-
Affected
Siemens
Search vendor "Siemens"
Nucleus Readystart V3
Search vendor "Siemens" for product "Nucleus Readystart V3"
< 2017.02.4
Search vendor "Siemens" for product "Nucleus Readystart V3" and version " < 2017.02.4"
-
Affected
Siemens
Search vendor "Siemens"
Nucleus Readystart V4
Search vendor "Siemens" for product "Nucleus Readystart V4"
< 4.1.1
Search vendor "Siemens" for product "Nucleus Readystart V4" and version " < 4.1.1"
-
Affected
Siemens
Search vendor "Siemens"
Nucleus Source Code
Search vendor "Siemens" for product "Nucleus Source Code"
*-
Affected