1/Jan/2019 - Vulnerability reported
08/Jan/2019 - M/s. Schneider opened a case to investigate
04/Feb/2019 - C3i asks for an update
05/Feb/2019 - M/s. Schneider confirmed the vulnerability & are currently working on an action plan.
08/Mar/2019 -  C3i Center asks for an update
18/Mar/2019-  M/s. Schneider requested for a list of all vulnerabilities
19/Mar/2019 - C3i Center shared a list of vulnerabilities reported yet
20/Mar/2019 - M/s. Schneider thanks to C3i center and agreed to provide update on all the cases by early next week.
21/Mar/2019 - C3i Center acknowledged their mail and awaiting for their valuable response

3/May/2019 - M/s. Schneider shared a CVE number with C3iAdvisory, But still not in publicly because still they didn't find any patch for this vulnerability.

9/May/2019 - C3i asked to Schneider for a CVE number.

9/May/2019 - M/s. Schneider said, Need some to patch this vulnerability.

31/May/2019 - C3i asked to Schneider for CVE number for this.

4/June/2019 - M/s. Schneider released a CVE number for this vulnerability.

4/June/2019 - C3i acknowledged to Schneider, closed this case with CVE number.