{"uuid": "87fb4d92-4ae8-4d30-bbf0-c47d5156a3ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13939", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17909", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2019-13939\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H)\n\ud83d\udd39 Description: A vulnerability has been identified in APOGEE MEC/MBC/PXC (P2) (All versions &lt; V2.8.2), APOGEE PXC Compact (BACnet) (All versions &lt; V3.5.3), APOGEE PXC Compact (P2 Ethernet) (All versions &gt;= V2.8.2 &lt; V2.8.19), APOGEE PXC Modular (BACnet) (All versions &lt; V3.5.3), APOGEE PXC Modular (P2 Ethernet) (All versions &gt;= V2.8.2 &lt; V2.8.19), Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions &lt; V2303), Desigo PXC00-E.D (All versions &gt;= V2.3 &lt; V6.0.327), Desigo PXC00-U (All versions &gt;= V2.3x and &lt; V6.00.327), Desigo PXC001-E.D (All versions &gt;= V2.3 &lt; V6.0.327), Desigo PXC100-E.D (All versions &gt;= V2.3 &lt; V6.0.327), Desigo PXC12-E.D (All versions &gt;= V2.3 &lt; V6.0.327), Desigo PXC128-U (All versions &gt;= V2.3x and &lt; V6.00.327), Desigo PXC200-E.D (All versions &gt;= V2.3 &lt; V6.0.327), Desigo PXC22-E.D (All versions &gt;= V2.3 &lt; V6.0.327), Desigo PXC22.1-E.D (All versions &gt;= V2.3 &lt; V6.0.327), Desigo PXC36.1-E.D (All versions &gt;= V2.3 &lt; V6.0.327), Desigo PXC50-E.D (All versions &gt;= V2.3 &lt; V6.0.327), Desigo PXC64-U (All versions &gt;= V2.3x and &lt; V6.00.327), Desigo PXM20-E (All versions &gt;= V2.3 &lt; V6.0.327), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions &lt; V2017.02.3), Nucleus Source Code (All versions), SIMOTICS CONNECT 400 (All versions &lt; V0.3.0.330), TALON TC Compact (BACnet) (All versions &lt; V3.5.3), TALON TC Modular (BACnet) (All versions &lt; V3.5.3). By sending specially crafted DHCP packets to a device where the DHCP client is enabled, an attacker could change the IP address of the device to an invalid value.\n\ud83d\udccf Published: 2020-01-16T15:35:24\n\ud83d\udccf Modified: 2025-06-10T15:17:09.328Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/pdf/ssa-434032.pdf\n2. https://cert-portal.siemens.com/productcert/pdf/ssa-162506.pdf\n3. https://us-cert.cisa.gov/ics/advisories/icsa-20-105-06\n4. https://cert-portal.siemens.com/productcert/html/ssa-434032.html\n5. https://cert-portal.siemens.com/productcert/html/ssa-162506.html", "creation_timestamp": "2025-06-10T15:31:09.000000Z"}