Vulnerabilites related to SICK AG - SICK MEAC300
cve-2025-0867
Vulnerability from cvelistv5
Published
2025-02-14 12:37
Modified
2025-02-21 14:16
Severity ?
EPSS score ?
Summary
The standard user uses the run as function to start the MEAC applications with administrative privileges. To ensure that the system can startup on its own, the credentials of the administrator were stored. Consequently, the EPC2 user can execute any command with administrative privileges. This allows a privilege escalation to the administrative level.
References
▼ | URL | Tags |
---|---|---|
https://sick.com/psirt | x_SICK PSIRT Website | |
https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF | x_SICK Operating Guidelines | |
https://www.cisa.gov/resources-tools/resources/ics-recommended-practices | x_ICS-CERT recommended practices on Industrial Security | |
https://www.first.org/cvss/calculator/3.1 | x_CVSS v3.1 Calculator | |
https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0001.pdf | vendor-advisory | |
https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0001.json | vendor-advisory, x_csaf |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SICK AG | SICK MEAC300 |
Version: 0 < 4.0.54.21 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0867", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-14T16:23:00.326523Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-14T16:23:21.027Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SICK MEAC300", "vendor": "SICK AG", "versions": [ { "lessThan": "4.0.54.21", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003e\u003cdiv\u003eThe standard user uses the run as function to start the MEAC applications with administrative privileges. To ensure that the system can startup on its own, the credentials of the administrator were stored. Consequently, the EPC2 user can execute any command with administrative privileges. This allows a privilege escalation to the administrative level.\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\u0026nbsp;\u003c/div\u003e\u003c/div\u003e" } ], "value": "The standard user uses the run as function to start the MEAC applications with administrative privileges. To ensure that the system can startup on its own, the credentials of the administrator were stored. Consequently, the EPC2 user can execute any command with administrative privileges. This allows a privilege escalation to the administrative level." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522 Insufficiently Protected Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-21T14:16:05.951Z", "orgId": "a6863dd2-93fc-443d-bef1-79f0b5020988", "shortName": "SICK AG" }, "references": [ { "tags": [ "x_SICK PSIRT Website" ], "url": "https://sick.com/psirt" }, { "tags": [ "x_SICK Operating Guidelines" ], "url": "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF" }, { "tags": [ "x_ICS-CERT recommended practices on Industrial Security" ], "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "tags": [ "x_CVSS v3.1 Calculator" ], "url": "https://www.first.org/cvss/calculator/3.1" }, { "tags": [ "vendor-advisory" ], "url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0001.pdf" }, { "tags": [ "vendor-advisory", "x_csaf" ], "url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0001.json" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Users are strongly recommended to upgrade to the latest release of the MEAC300 (\u0026gt;=4.0.54.21) that includes a patch for the vulnerability.\n\n\u003cbr\u003e" } ], "value": "Users are strongly recommended to upgrade to the latest release of the MEAC300 (\u003e=4.0.54.21) that includes a patch for the vulnerability." } ], "source": { "advisory": "sca-2025-0001", "discovery": "INTERNAL" }, "title": "Privilege Escalation in MEAC300", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "a6863dd2-93fc-443d-bef1-79f0b5020988", "assignerShortName": "SICK AG", "cveId": "CVE-2025-0867", "datePublished": "2025-02-14T12:37:09.250Z", "dateReserved": "2025-01-30T08:11:55.266Z", "dateUpdated": "2025-02-21T14:16:05.951Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }