Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Capital_vstar
(Siemens)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 14 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-01-16 | CVE-2019-13939 | A vulnerability has been identified in APOGEE MEC/MBC/PXC (P2) (All versions < V2.8.2), APOGEE PXC Compact (BACnet) (All versions < V3.5.3), APOGEE PXC Compact (P2 Ethernet) (All versions >= V2.8.2 < V2.8.19), APOGEE PXC Modular (BACnet) (All versions < V3.5.3), APOGEE PXC Modular (P2 Ethernet) (All versions >= V2.8.2 < V2.8.19), Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Desigo PXC00-E.D (All versions >= V2.3 < V6.0.327),... | Apogee_modular_building_controller_firmware, Apogee_modular_equiment_controller_firmware, Apogee_pxc_firmware, Capital_vstar, Desigo_pxc001\-E\.d_firmware, Desigo_pxc00\-E\.d_firmware, Desigo_pxc00\-U_firmware, Desigo_pxc12\-E\.d_firmware, Desigo_pxc22\-E\.d_firmware, Desigo_pxc22\.1\-E\.d_firmware, Desigo_pxc36\.1\-E\.d_firmware, Desigo_pxc_firmware, Desigo_pxm20_firmware, Desigopxc100\-E\.d_firmware, Desigopxc128\-U_firmware, Desigopxc200\-E\.d_firmware, Desigopxc50\-E\.d_firmware, Desigopxc64\-U_firmware, Desigopxm20\-E_firmware, Nucleus_net, Nucleus_readystart, Nucleus_rtos, Nucleus_safetycert, Nucleus_source_code, Simotics_connect_400_firmware, Talon_tc_firmware | N/A | ||
2021-04-22 | CVE-2021-25663 | A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (All versions including affected IPv6 stack). The function that processes IPv6 headers does not check the lengths of extension header options, allowing attackers to put this function into an infinite... | Capital_vstar, Nucleus_net, Nucleus_readystart, Nucleus_source_code | N/A | ||
2021-04-22 | CVE-2021-25664 | A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (All versions including affected IPv6 stack). The function that processes the Hop-by-Hop extension header in IPv6 packets and its options lacks any checks against the length field of the header,... | Capital_vstar, Nucleus_net, Nucleus_readystart_v3, Nucleus_readystart_v4, Nucleus_source_code | 7.5 | ||
2021-02-09 | CVE-2020-28388 | A vulnerability has been identified in APOGEE PXC Compact (BACnet) (All versions < V3.5.5), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.20), APOGEE PXC Modular (BACnet) (All versions < V3.5.5), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.20), Nucleus NET (All versions < V5.2), Nucleus ReadyStart V3 (All versions < V2012.12), Nucleus Source Code (All versions), PLUSCONTROL 1st Gen (All versions), TALON TC Compact (BACnet) (All versions < V3.5.5), TALON TC Modular (BACnet)... | Capital_vstar, Nucleus_net, Nucleus_readystart, Nucleus_source_code, Pluscontrol_1st_gen | 5.3 | ||
2021-11-09 | CVE-2021-31344 | A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions < V1.0.0.0). ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. (FSMD-2021-0004) | Apogee_modular_building_controller_firmware, Apogee_modular_equiment_controller_firmware, Apogee_pxc_compact_firmware, Apogee_pxc_modular_firmware, Capital_vstar, Nucleus_net, Nucleus_readystart_v3, Nucleus_readystart_v4, Nucleus_source_code, Talon_tc_compact_firmware, Talon_tc_modular_firmware | 5.3 | ||
2021-11-09 | CVE-2021-31345 | A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions). The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on a user-defined applications that runs on top of the UDP protocol. (FSMD-2021-0006) | Apogee_modular_building_controller_firmware, Apogee_modular_equiment_controller_firmware, Apogee_pxc_compact_firmware, Apogee_pxc_modular_firmware, Capital_vstar, Nucleus_net, Nucleus_readystart_v3, Nucleus_source_code, Talon_tc_compact_firmware, Talon_tc_modular_firmware | 9.1 | ||
2021-11-09 | CVE-2021-31346 | A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions < V1.0.0.0). The total length of an ICMP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer... | Apogee_modular_building_controller_firmware, Apogee_modular_equiment_controller_firmware, Apogee_pxc_compact_firmware, Apogee_pxc_modular_firmware, Capital_vstar, Nucleus_net, Nucleus_readystart_v3, Nucleus_readystart_v4, Nucleus_source_code, Talon_tc_compact_firmware, Talon_tc_modular_firmware | 9.1 | ||
2021-11-09 | CVE-2021-31881 | A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303). When processing a DHCP OFFER message, the DHCP client application does not validate the length of the Vendor option(s), leading to Denial-of-Service conditions. (FSMD-2021-0008) | Apogee_modular_building_controller_firmware, Apogee_modular_equiment_controller_firmware, Apogee_pxc_compact_firmware, Apogee_pxc_modular_firmware, Capital_vstar, Nucleus_net, Nucleus_readystart_v3, Nucleus_source_code, Talon_tc_compact_firmware, Talon_tc_modular_firmware | 7.5 | ||
2021-11-09 | CVE-2021-31882 | A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303). The DHCP client application does not validate the length of the Domain Name Server IP option(s) (0x06) when processing DHCP ACK packets. This may lead to Denial-of-Service conditions. (FSMD-2021-0011) | Apogee_modular_building_controller_firmware, Apogee_modular_equiment_controller_firmware, Apogee_pxc_compact_firmware, Apogee_pxc_modular_firmware, Capital_vstar, Nucleus_net, Nucleus_readystart_v3, Nucleus_source_code, Talon_tc_compact_firmware, Talon_tc_modular_firmware | 7.5 | ||
2021-11-09 | CVE-2021-31883 | A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303). When processing a DHCP ACK message, the DHCP client application does not validate the length of the Vendor option(s), leading to Denial-of-Service conditions. (FSMD-2021-0013) | Apogee_modular_building_controller_firmware, Apogee_modular_equiment_controller_firmware, Apogee_pxc_compact_firmware, Apogee_pxc_modular_firmware, Capital_vstar, Nucleus_net, Nucleus_readystart_v3, Nucleus_source_code, Talon_tc_compact_firmware, Talon_tc_modular_firmware | 7.5 |