1/Jan/2019 - Vulnerability reported
08/Jan/2019 - M/s. Schneider opened a case to investigate
04/Feb/2019 - C3i asks for an update
05/Feb/2019 - M/s. Schneider confirmed the vulnerability & are currently working on an action plan.
08/Mar/2019 - C3i Center asks for an update
18/Mar/2019- M/s. Schneider requested for a list of all vulnerabilities
19/Mar/2019 - C3i Center shared a list of vulnerabilities reported yet
20/Mar/2019 - M/s. Schneider thanks to C3i center and agreed to provide update on all the cases by early next week.
21/Mar/2019 - C3i Center acknowledged their mail and awaiting for their valuable response
3/May/2019 - M/s. Schneider shared a CVE number with C3iAdvisory, But still not in publicly because still they didn't find any patch for this vulnerability.
9/May/2019 - C3i asked to Schneider for a CVE number.
9/May/2019 - M/s. Schneider said, Need some to patch this vulnerability.
31/May/2019 - C3i asked to Schneider for CVE number for this.
4/June/2019 - M/s. Schneider released a CVE number for this vulnerability.
4/June/2019 - C3i acknowledged to Schneider, closed this case with CVE number.