Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2021-31884
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions < V3.5.4), APOGEE PXC Compact (P2 Ethernet) (All versions < V2.8.19), APOGEE PXC Modular (BACnet) (All versions < V3.5.4), APOGEE PXC Modular (P2 Ethernet) (All versions < V2.8.19), Capital VSTAR (All versions with enabled Ethernet options), Desigo PXC00-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC00-U (All versions >= V2.3 and < V6.30.016), Desigo PXC001-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC100-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC12-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC128-U (All versions >= V2.3 and < V6.30.016), Desigo PXC200-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC22.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC36.1-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC50-E.D (All versions >= V2.3 and < V6.30.016), Desigo PXC64-U (All versions >= V2.3 and < V6.30.016), Desigo PXM20-E (All versions >= V2.3 and < V6.30.016), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions < V3.5.4), TALON TC Modular (BACnet) (All versions < V3.5.4). The DHCP client application assumes that the data supplied with the “Hostname” DHCP option is NULL terminated. In cases when global hostname variable is not defined, this may lead to Out-of-bound reads, writes, and Denial-of-service conditions. (FSMD-2021-0014)
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
不恰当的空终结符
Source: NVD (National Vulnerability Database)
Vulnerability Title
Siemens Nucleus ReadyStart 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Siemens Nucleus ReadyStart是德国西门子(Siemens)公司的一个捆绑式解决方案。用于加速完整系统的快速启动并提供丰富的板级支持包 (Bsp) Siemens Nucleus ReadyStart存在安全漏洞,该漏洞源于 DHCP 客户端应用程序假定随 Hostname DHCP 选项提供的数据是以 NULL 终止的。在未定义全局主机名变量的情况下,这可能会导致越界读取、越界写入和拒绝服务条件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
SiemensAPOGEE MBC (PPC) (BACnet) All versions -
SiemensAPOGEE MBC (PPC) (P2 Ethernet) All versions -
SiemensAPOGEE MEC (PPC) (BACnet) All versions -
SiemensAPOGEE MEC (PPC) (P2 Ethernet) All versions -
SiemensAPOGEE PXC Compact (BACnet) All versions < V3.5.4 -
SiemensAPOGEE PXC Compact (P2 Ethernet) All versions < V2.8.19 -
SiemensAPOGEE PXC Modular (BACnet) All versions < V3.5.4 -
SiemensAPOGEE PXC Modular (P2 Ethernet) All versions < V2.8.19 -
SiemensCapital VSTAR All versions with enabled Ethernet options -
SiemensDesigo PXC00-E.D All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC00-U All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC001-E.D All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC100-E.D All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC12-E.D All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC128-U All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC200-E.D All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC22-E.D All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC22.1-E.D All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC36.1-E.D All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC50-E.D All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXC64-U All versions >= V2.3 and < V6.30.016 -
SiemensDesigo PXM20-E All versions >= V2.3 and < V6.30.016 -
SiemensNucleus NET All versions -
SiemensNucleus ReadyStart V3 All versions < V2017.02.4 -
SiemensNucleus Source Code All versions -
SiemensTALON TC Compact (BACnet) All versions < V3.5.4 -
SiemensTALON TC Modular (BACnet) All versions < V3.5.4 -
II. Public POCs for CVE-2021-31884
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2021-31884
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-31884

No comments yet


Leave a comment