Project Subscriptions
| Vendors | Products |
|---|---|
|
Siemens
Subscribe
|
Apogee Modular Building Controller
Subscribe
Apogee Modular Building Controller Firmware
Subscribe
Apogee Modular Equiment Controller
Subscribe
Apogee Modular Equiment Controller Firmware
Subscribe
Apogee Pxc
Subscribe
Apogee Pxc Firmware
Subscribe
Capital Vstar
Subscribe
Desigo Pxc
Subscribe
Desigo Pxc00-e.d
Subscribe
Desigo Pxc00-e.d Firmware
Subscribe
Desigo Pxc00-u
Subscribe
Desigo Pxc00-u Firmware
Subscribe
Desigo Pxc001-e.d
Subscribe
Desigo Pxc001-e.d Firmware
Subscribe
Desigo Pxc12-e.d
Subscribe
Desigo Pxc12-e.d Firmware
Subscribe
Desigo Pxc22-e.d
Subscribe
Desigo Pxc22-e.d Firmware
Subscribe
Desigo Pxc22.1-e.d
Subscribe
Desigo Pxc22.1-e.d Firmware
Subscribe
Desigo Pxc36.1-e.d
Subscribe
Desigo Pxc36.1-e.d Firmware
Subscribe
Desigo Pxc Firmware
Subscribe
Desigo Pxm20
Subscribe
Desigo Pxm20 Firmware
Subscribe
Desigopxc100-e.d
Subscribe
Desigopxc100-e.d Firmware
Subscribe
Desigopxc128-u
Subscribe
Desigopxc128-u Firmware
Subscribe
Desigopxc200-e.d
Subscribe
Desigopxc200-e.d Firmware
Subscribe
Desigopxc50-e.d
Subscribe
Desigopxc50-e.d Firmware
Subscribe
Desigopxc64-u
Subscribe
Desigopxc64-u Firmware
Subscribe
Desigopxm20-e
Subscribe
Desigopxm20-e Firmware
Subscribe
Nucleus Net
Subscribe
Nucleus Readystart
Subscribe
Nucleus Rtos
Subscribe
Nucleus Safetycert
Subscribe
Nucleus Source Code
Subscribe
Simotics Connect 400
Subscribe
Simotics Connect 400 Firmware
Subscribe
Talon Tc
Subscribe
Talon Tc Firmware
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-5206 | A vulnerability has been identified in APOGEE MEC/MBC/PXC (P2) (All versions < V2.8.2), APOGEE PXC Compact (BACnet) (All versions < V3.5.3), APOGEE PXC Compact (P2 Ethernet) (All versions >= V2.8.2 < V2.8.19), APOGEE PXC Modular (BACnet) (All versions < V3.5.3), APOGEE PXC Modular (P2 Ethernet) (All versions >= V2.8.2 < V2.8.19), Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Desigo PXC00-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC00-U (All versions >= V2.3x and < V6.00.327), Desigo PXC001-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC100-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC12-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC128-U (All versions >= V2.3x and < V6.00.327), Desigo PXC200-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC22-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC22.1-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC36.1-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC50-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC64-U (All versions >= V2.3x and < V6.00.327), Desigo PXM20-E (All versions >= V2.3 < V6.0.327), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus Source Code (All versions), SIMOTICS CONNECT 400 (All versions < V0.3.0.330), TALON TC Compact (BACnet) (All versions < V3.5.3), TALON TC Modular (BACnet) (All versions < V3.5.3). By sending specially crafted DHCP packets to a device where the DHCP client is enabled, an attacker could change the IP address of the device to an invalid value. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 10 Jun 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus Source Code (All versions). By sending specially crafted DHCP packets to a device where the DHCP client is enabled, an attacker could change the IP address of the device to an invalid value. | A vulnerability has been identified in APOGEE MEC/MBC/PXC (P2) (All versions < V2.8.2), APOGEE PXC Compact (BACnet) (All versions < V3.5.3), APOGEE PXC Compact (P2 Ethernet) (All versions >= V2.8.2 < V2.8.19), APOGEE PXC Modular (BACnet) (All versions < V3.5.3), APOGEE PXC Modular (P2 Ethernet) (All versions >= V2.8.2 < V2.8.19), Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Desigo PXC00-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC00-U (All versions >= V2.3x and < V6.00.327), Desigo PXC001-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC100-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC12-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC128-U (All versions >= V2.3x and < V6.00.327), Desigo PXC200-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC22-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC22.1-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC36.1-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC50-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC64-U (All versions >= V2.3x and < V6.00.327), Desigo PXM20-E (All versions >= V2.3 < V6.0.327), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus Source Code (All versions), SIMOTICS CONNECT 400 (All versions < V0.3.0.330), TALON TC Compact (BACnet) (All versions < V3.5.3), TALON TC Modular (BACnet) (All versions < V3.5.3). By sending specially crafted DHCP packets to a device where the DHCP client is enabled, an attacker could change the IP address of the device to an invalid value. |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 11 Mar 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2025-06-10T15:17:09.328Z
Reserved: 2019-07-18T00:00:00.000Z
Link: CVE-2019-13939
No data.
Status : Modified
Published: 2020-01-16T16:15:16.277
Modified: 2025-06-10T16:15:33.853
Link: CVE-2019-13939
No data.
OpenCVE Enrichment
No data.
EUVD