CVE-2019-13939
📋 TL;DR
This vulnerability allows attackers to send specially crafted DHCP packets to change a device's IP address to an invalid value when the DHCP client is enabled. It affects multiple Siemens building automation and industrial control system products. The attack requires network access to the vulnerable device.
💻 Affected Systems
- APOGEE MEC/MBC/PXC (P2)
- APOGEE PXC Compact (BACnet)
- APOGEE PXC Compact (P2 Ethernet)
- APOGEE PXC Modular (BACnet)
- APOGEE PXC Modular (P2 Ethernet)
- Capital Embedded AR Classic 431-422
- Capital Embedded AR Classic R20-11
- Desigo PXC00-E.D
- Desigo PXC00-U
- Desigo PXC001-E.D
- Desigo PXC100-E.D
- Desigo PXC12-E.D
- Desigo PXC128-U
- Desigo PXC200-E.D
- Desigo PXC22-E.D
- Desigo PXC22.1-E.D
- Desigo PXC36.1-E.D
- Desigo PXC50-E.D
- Desigo PXC64-U
- Desigo PXM20-E
- Nucleus NET
- Nucleus ReadyStart V3
- Nucleus Source Code
- SIMOTICS CONNECT 400
- TALON TC Compact (BACnet)
- TALON TC Modular (BACnet)
📦 What is this software?
Apogee Modular Building Controller Firmware by Siemens
View all CVEs affecting Apogee Modular Building Controller Firmware →
Apogee Modular Equiment Controller Firmware by Siemens
View all CVEs affecting Apogee Modular Equiment Controller Firmware →
Nucleus Net by Siemens
⚠️ Risk & Real-World Impact
Worst Case
Network disruption causing loss of connectivity to critical building automation or industrial control systems, potentially affecting HVAC, lighting, or other facility operations.
Likely Case
Temporary loss of network connectivity to affected devices requiring manual intervention to restore proper IP configuration.
If Mitigated
Minimal impact if devices are on isolated networks with proper DHCP server controls and network segmentation.
🎯 Exploit Status
Exploitation requires sending specially crafted DHCP packets to the vulnerable device's network interface. No authentication required if network access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Varies by product - APOGEE P2: V2.8.19+, APOGEE BACnet: V3.5.3+, Desigo: V6.0.327+, Nucleus ReadyStart: V2017.02.3+, SIMOTICS: V0.3.0.330+
Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-162506.html
Restart Required: Yes
Instructions:
1. Identify affected products and versions. 2. Download appropriate firmware updates from Siemens support portal. 3. Follow vendor-specific update procedures for each device type. 4. Verify successful update and proper device functionality.
🔧 Temporary Workarounds
Disable DHCP Client
allConfigure affected devices with static IP addresses instead of using DHCP
Network Segmentation
allIsolate affected devices on separate VLANs with strict firewall rules limiting DHCP traffic
🧯 If You Can't Patch
- Implement strict network segmentation to isolate affected devices
- Deploy network monitoring to detect anomalous DHCP traffic patterns
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against affected version ranges in Siemens advisories. Verify if DHCP client is enabled.
Check Version:
Varies by product - typically accessed through device web interface or management software
Verify Fix Applied:
Confirm firmware version is updated to patched version. Test DHCP functionality to ensure proper IP assignment.
📡 Detection & Monitoring
Log Indicators:
- Unexpected IP address changes
- DHCP error messages
- Network connectivity loss logs
Network Indicators:
- Unusual DHCP packet patterns
- Multiple DHCP requests from single device
- DHCP packets with malformed options
SIEM Query:
source="dhcp" AND (message="malformed" OR message="invalid" OR dest_ip="0.0.0.0" OR dest_ip="255.255.255.255")
🔗 References
- https://cert-portal.siemens.com/productcert/html/ssa-162506.html
- https://cert-portal.siemens.com/productcert/html/ssa-434032.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-162506.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-434032.pdf
- https://us-cert.cisa.gov/ics/advisories/icsa-20-105-06
- https://cert-portal.siemens.com/productcert/html/ssa-162506.html
- https://cert-portal.siemens.com/productcert/html/ssa-434032.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-162506.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-434032.pdf
- https://us-cert.cisa.gov/ics/advisories/icsa-20-105-06