Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-31884

EPSS 0.73% · P73
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-31884

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.19), APOGEE PXC Modular (BACnet) (All versions < V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.19), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC00-U (All versions >= V2.3 and < V6.30.016), Desigo PXC001-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC100-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC12-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC128-U (All versions >= V2.3 and < V6.30.016), Desigo PXC200-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC36.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC50-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC64-U (All versions >= V2.3 and < V6.30.016), Desigo PXM20-E (All versions >= V2.3 and < V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions < V3.5.4), TALON TC Modular (BACnet) (All versions < V3.5.4). The DHCP client application assumes that the data supplied with the “Hostname” DHCP option is NULL terminated. In cases when global hostname variable is not defined, this may lead to Out-of-bound reads, writes, and Denial-of-service conditions. (FSMD-2021-0014)
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
不恰当的空终结符
Source: NVD (National Vulnerability Database)
Vulnerability Title
Siemens Nucleus ReadyStart 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Siemens Nucleus ReadyStart是德国西门子(Siemens)公司的一个捆绑式解决方案。用于加速完整系统的快速启动并提供丰富的板级支持包 (Bsp) Siemens Nucleus ReadyStart存在安全漏洞,该漏洞源于 DHCP 客户端应用程序假定随 Hostname DHCP 选项提供的数据是以 NULL 终止的。在未定义全局主机名变量的情况下,这可能会导致越界读取、越界写入和拒绝服务条件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
SiemensAPOGEE MBC (PPC) (BACnet) All versions -
SiemensAPOGEE MBC (PPC) (P2 Ethernet) All versions -
SiemensAPOGEE MEC (PPC) (BACnet) All versions -
SiemensAPOGEE MEC (PPC) (P2 Ethernet) All versions -
SiemensAPOGEE PXC Compact (BACnet) All versions < V3.5.4 -
SiemensAPOGEE PXC Compact (P2 Ethernet) All versions < V2.8.19 -
SiemensAPOGEE PXC Modular (BACnet) All versions < V3.5.4 -
SiemensAPOGEE PXC Modular (P2 Ethernet) All versions < V2.8.19 -
SiemensCapital VSTAR All versions with enabled Ethernet options -
SiemensDesigo PXC00-E.D All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC00-U All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC001-E.D All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC100-E.D All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC12-E.D All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC128-U All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC200-E.D All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC22-E.D All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC22.1-E.D All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC36.1-E.D All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC50-E.D All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC64-U All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXM20-E All versions >= V2.3 and < V6.30.016 -
SiemensNucleus NET All versions -
SiemensNucleus ReadyStart V3 All versions < V2017.02.4 -
SiemensNucleus Source Code All versions -
SiemensTALON TC Compact (BACnet) All versions < V3.5.4 -
SiemensTALON TC Modular (BACnet) All versions < V3.5.4 -

II. Public POCs for CVE-2021-31884

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-31884

登录查看更多情报信息。

Same Patch Batch · Siemens · 2021-11-09 · 25 CVEs total

CVE-2021-403589.9 CRITICALSiemens SIMATIC PCS 7和SIMATIC WinCC 路径遍历漏洞
CVE-2021-313468.2 HIGHSiemens Nucleus 安全漏洞
CVE-2021-403597.7 HIGHSiemens SIMATIC PCS 7和SIMATIC WinCC 路径遍历漏洞
CVE-2021-313457.5 HIGHSiemens Nucleus 安全漏洞
CVE-2021-318907.5 HIGHSiemens Nucleus ReadyStart 安全漏洞
CVE-2021-318897.5 HIGHSiemens Nucleus 数字错误漏洞
CVE-2021-318817.1 HIGHSiemens Nucleus ReadyStart 缓冲区错误漏洞
CVE-2021-318837.1 HIGHSiemens Nucleus ReadyStart 缓冲区错误漏洞
CVE-2021-318826.5 MEDIUMSiemens Nucleus 缓冲区错误漏洞
CVE-2021-403645.5 MEDIUMSiemens SIMATIC PCS 7和SIMATIC WinCC 日志信息泄露漏洞
CVE-2021-313445.3 MEDIUMSiemens Nucleus ReadyStart 安全漏洞
CVE-2021-31888Siemens Nucleus ReadyStart 缓冲区错误漏洞
CVE-2020-10052SIMATIC RTLS 日志信息泄露漏洞
CVE-2020-10053SIMATIC RTLS 安全漏洞
CVE-2020-10054SIMATIC RTLS 输入验证错误漏洞
CVE-2021-31885Siemens Nucleus ReadyStart 安全漏洞
CVE-2021-31886Siemens Nucleus ReadyStart 缓冲区错误漏洞
CVE-2021-42026Siemens Mendix 安全漏洞
CVE-2021-31887Siemens Nucleus ReadyStart 缓冲区错误漏洞
CVE-2021-37207Siemens Sentron Powermanager 安全漏洞

Showing top 20 of 25 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2021-31884

No comments yet


Leave a comment