A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303). When processing a DHCP OFFER message, the DHCP client application does not validate the length of the Vendor option(s), leading to Denial-of-Service conditions. (FSMD-2021-0008)
2021-11-09T12:15:09.257
2024-11-21T06:06:25.167
Modified
CVSSv3.1: 7.1 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | siemens | capital_vstar | * | Yes |
Application | siemens | nucleus_net | * | Yes |
Application | siemens | nucleus_readystart_v3 | < 2012.08 | Yes |
Application | siemens | nucleus_source_code | * | Yes |
Operating System | siemens | apogee_modular_building_controller_firmware | * | Yes |
Hardware | siemens | apogee_modular_building_controller | - | No |
Operating System | siemens | apogee_modular_equiment_controller_firmware | * | Yes |
Hardware | siemens | apogee_modular_equiment_controller | - | No |
Operating System | siemens | apogee_pxc_compact_firmware | * | Yes |
Hardware | siemens | apogee_pxc_compact | - | No |
Operating System | siemens | apogee_pxc_modular_firmware | * | Yes |
Hardware | siemens | apogee_pxc_modular | - | No |
Operating System | siemens | talon_tc_compact_firmware | * | Yes |
Hardware | siemens | talon_tc_compact | - | No |
Operating System | siemens | talon_tc_modular_firmware | * | Yes |
Hardware | siemens | talon_tc_modular | - | No |