CVE-2021-31881
HIGHSiemens Capital Vstar < 2012.08 - Out-of-Bounds Read
Title source: ruleDescription
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303). When processing a DHCP OFFER message, the DHCP client application does not validate the length of the Vendor option(s), leading to Denial-of-Service conditions. (FSMD-2021-0008)
References (6)
Core 6
Core References
Vendor Advisory
https://cert-portal.siemens.com/productcert/html/ssa-114589.html
Vendor Advisory
https://cert-portal.siemens.com/productcert/html/ssa-620288.html
Vendor Advisory x_refsource_misc
https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf
Vendor Advisory x_refsource_misc
https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf
Vendor Advisory x_refsource_misc
https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf
Vendor Advisory
https://cert-portal.siemens.com/productcert/html/ssa-044112.html
Scores
CVSS v3
7.1
EPSS
0.0141
EPSS Percentile
80.7%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (10)
siemens/apogee_modular_building_controller_firmware
siemens/apogee_modular_equiment_controller_firmware
siemens/apogee_pxc_compact_firmware
siemens/apogee_pxc_modular_firmware
siemens/capital_vstar
siemens/nucleus_net
siemens/nucleus_readystart_v3
< 2012.08
siemens/nucleus_source_code
siemens/talon_tc_compact_firmware
siemens/talon_tc_modular_firmware
Published
Nov 09, 2021
Tracked Since
Feb 18, 2026