A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions), SIMOTICS CONNECT 400 (All versions < V0.5.0.0), SIMOTICS CONNECT 400 (All versions < V1.0.0.0). ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. (FSMD-2021-0004)
2021-11-09T12:15:09.087
2024-11-21T06:05:27.613
Modified
CVSSv3.1: 5.3 (MEDIUM)
AV:N/AC:L/Au:N/C:N/I:P/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | siemens | capital_vstar | * | Yes |
Application | siemens | nucleus_net | * | Yes |
Application | siemens | nucleus_readystart_v3 | < 2017.02.1 | Yes |
Application | siemens | nucleus_readystart_v4 | < 4.1.1 | Yes |
Application | siemens | nucleus_source_code | * | Yes |
Operating System | siemens | apogee_modular_building_controller_firmware | * | Yes |
Hardware | siemens | apogee_modular_building_controller | - | No |
Operating System | siemens | apogee_modular_equiment_controller_firmware | * | Yes |
Hardware | siemens | apogee_modular_equiment_controller | - | No |
Operating System | siemens | apogee_pxc_compact_firmware | * | Yes |
Hardware | siemens | apogee_pxc_compact | - | No |
Operating System | siemens | apogee_pxc_modular_firmware | * | Yes |
Hardware | siemens | apogee_pxc_modular | - | No |
Operating System | siemens | talon_tc_compact_firmware | * | Yes |
Hardware | siemens | talon_tc_compact | - | No |
Operating System | siemens | talon_tc_modular_firmware | * | Yes |
Hardware | siemens | talon_tc_modular | - | No |