cve/2019/CVE-2019-13939.md

48 lines
4.9 KiB
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2019-13939](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13939)
![](https://img.shields.io/static/v1?label=Product&message=APOGEE%20MEC%2FMBC%2FPXC%20(P2)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=APOGEE%20PXC%20Compact%20(BACnet)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=APOGEE%20PXC%20Compact%20(P2%20Ethernet)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=APOGEE%20PXC%20Modular%20(BACnet)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=APOGEE%20PXC%20Modular%20(P2%20Ethernet)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Capital%20Embedded%20AR%20Classic%20431-422&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Capital%20Embedded%20AR%20Classic%20R20-11&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Desigo%20PXC00-E.D&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Desigo%20PXC00-U&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Desigo%20PXC001-E.D&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Desigo%20PXC100-E.D&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Desigo%20PXC12-E.D&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Desigo%20PXC128-U&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Desigo%20PXC200-E.D&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Desigo%20PXC22-E.D&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Desigo%20PXC22.1-E.D&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Desigo%20PXC36.1-E.D&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Desigo%20PXC50-E.D&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Desigo%20PXC64-U&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Desigo%20PXM20-E&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Nucleus%20NET&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Nucleus%20ReadyStart%20V3&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Nucleus%20Source%20Code&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMOTICS%20CONNECT%20400&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TALON%20TC%20Compact%20(BACnet)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TALON%20TC%20Modular%20(BACnet)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=All%20versions%20%3C%20V0.3.0.330%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=All%20versions%20%3C%20V2.8.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=All%20versions%20%3E%3D%20V2.3x%20and%20%3C%20V6.00.327%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=V2.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=V2.8.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%3A%20Improper%20Input%20Validation&color=brightgreen)
### Description
A vulnerability has been identified in APOGEE MEC/MBC/PXC (P2) (All versions < V2.8.2), APOGEE PXC Compact (BACnet) (All versions < V3.5.3), APOGEE PXC Compact (P2 Ethernet) (All versions >= V2.8.2 < V2.8.19), APOGEE PXC Modular (BACnet) (All versions < V3.5.3), APOGEE PXC Modular (P2 Ethernet) (All versions >= V2.8.2 < V2.8.19), Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Desigo PXC00-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC00-U (All versions >= V2.3x and < V6.00.327), Desigo PXC001-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC100-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC12-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC128-U (All versions >= V2.3x and < V6.00.327), Desigo PXC200-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC22-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC22.1-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC36.1-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC50-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC64-U (All versions >= V2.3x and < V6.00.327), Desigo PXM20-E (All versions >= V2.3 < V6.0.327), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus Source Code (All versions), SIMOTICS CONNECT 400 (All versions < V0.3.0.330), TALON TC Compact (BACnet) (All versions < V3.5.3), TALON TC Modular (BACnet) (All versions < V3.5.3). By sending specially crafted DHCP packets to a device where the DHCP client is enabled, an attacker could change the IP address of the device to an invalid value.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds