Vulnerabilites related to sick - lms531
cve-2023-31412
Vulnerability from cvelistv5
Published
2023-08-24 18:15
Modified
2024-12-09 14:12
Severity ?
EPSS score ?
Summary
The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password.
References
▼ | URL | Tags |
---|---|---|
https://sick.com/psirt | issue-tracking | |
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf | vendor-advisory | |
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json | x_csaf |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:53:30.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "issue-tracking", "x_transferred" ], "url": "https://sick.com/psirt" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf" }, { "tags": [ "x_csaf", "x_transferred" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:h:sick:lms5xx:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "lms5xx", "vendor": "sick", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-31412", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T19:15:26.979357Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-09T14:12:04.011Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "LMS5xx", "vendor": "SICK AG", "versions": [ { "status": "affected", "version": "all firmware versions" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": true, "type": "text/html", "value": "The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password." } ], "value": "The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Use of Weak Hash", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-24T18:15:53.835Z", "orgId": "a6863dd2-93fc-443d-bef1-79f0b5020988", "shortName": "SICK AG" }, "references": [ { "tags": [ "issue-tracking" ], "url": "https://sick.com/psirt" }, { "tags": [ "vendor-advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf" }, { "tags": [ "x_csaf" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json" } ], "source": { "discovery": "EXTERNAL" }, "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": true, "type": "text/html", "value": "Please make sure that you apply general security practices when operating the LMS5xx. The following General Security Practices and Operating Guidelines could mitigate the associated security risk. It is also recommended to apply the security practices listed in the LMS5xx hardening guide. " } ], "value": "Please make sure that you apply general security practices when operating the LMS5xx. The following General Security Practices and Operating Guidelines could mitigate the associated security risk. It is also recommended to apply the security practices listed in the LMS5xx hardening guide. " } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "a6863dd2-93fc-443d-bef1-79f0b5020988", "assignerShortName": "SICK AG", "cveId": "CVE-2023-31412", "datePublished": "2023-08-24T18:15:53.835Z", "dateReserved": "2023-04-27T18:35:47.418Z", "dateUpdated": "2024-12-09T14:12:04.011Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4419
Vulnerability from cvelistv5
Published
2023-08-24 18:08
Modified
2024-12-09 14:12
Severity ?
EPSS score ?
Summary
The LMS5xx uses hard-coded credentials, which potentially allow low-skilled
unauthorized remote attackers to reconfigure settings and /or disrupt the functionality of the device.
References
▼ | URL | Tags |
---|---|---|
https://sick.com/psirt | issue-tracking | |
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf | vendor-advisory | |
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json | x_csaf |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:24:04.655Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "issue-tracking", "x_transferred" ], "url": "https://sick.com/psirt" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf" }, { "tags": [ "x_csaf", "x_transferred" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:h:sick:lms5xx:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "lms5xx", "vendor": "sick", "versions": [ { "lessThan": "2.21", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-4419", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T19:46:33.605067Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-09T14:12:11.224Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "LMS5xx", "vendor": "SICK AG", "versions": [ { "lessThan": " V2.21", "status": "affected", "version": "0", "versionType": "*" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": true, "type": "text/html", "value": "The LMS5xx uses hard-coded credentials, which potentially allow low-skilled\nunauthorized remote attackers to reconfigure settings and /or disrupt the functionality of the device." } ], "value": "The LMS5xx uses hard-coded credentials, which potentially allow low-skilled\nunauthorized remote attackers to reconfigure settings and /or disrupt the functionality of the device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Use of Hard-coded Credentials", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-24T18:17:41.123Z", "orgId": "a6863dd2-93fc-443d-bef1-79f0b5020988", "shortName": "SICK AG" }, "references": [ { "tags": [ "issue-tracking" ], "url": "https://sick.com/psirt" }, { "tags": [ "vendor-advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf" }, { "tags": [ "x_csaf" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": true, "type": "text/html", "value": "SICK has released a new version V2.21 of the SICK LMS5xx firmware and recommends updating to the newest version." } ], "value": "SICK has released a new version V2.21 of the SICK LMS5xx firmware and recommends updating to the newest version." } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "a6863dd2-93fc-443d-bef1-79f0b5020988", "assignerShortName": "SICK AG", "cveId": "CVE-2023-4419", "datePublished": "2023-08-24T18:08:19.977Z", "dateReserved": "2023-08-18T13:09:27.459Z", "dateUpdated": "2024-12-09T14:12:11.224Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4418
Vulnerability from cvelistv5
Published
2023-08-24 18:05
Modified
2024-12-09 14:12
Severity ?
EPSS score ?
Summary
A remote unprivileged attacker can sent multiple packages to the LMS5xx to disrupt its availability through a TCP SYN-based denial-of-service (DDoS) attack.
By exploiting this vulnerability, an attacker can flood the targeted LMS5xx with a high volume of TCP SYN requests, overwhelming its resources and causing it to become unresponsive or unavailable for legitimate users.
References
▼ | URL | Tags |
---|---|---|
https://sick.com/psirt | issue-tracking | |
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf | vendor-advisory | |
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json | x_csaf |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:24:04.985Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "issue-tracking", "x_transferred" ], "url": "https://sick.com/psirt" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf" }, { "tags": [ "x_csaf", "x_transferred" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:h:sick:lms5xx:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "lms5xx", "vendor": "sick", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-4418", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T19:55:17.446547Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-09T14:12:17.603Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "LMS5xx", "vendor": "SICK AG", "versions": [ { "status": "affected", "version": "all firmware versions" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": true, "type": "text/html", "value": "A remote unprivileged attacker can sent multiple packages to the LMS5xx to disrupt its availability through a TCP SYN-based denial-of-service (DDoS) attack. \nBy exploiting this vulnerability, an attacker can flood the targeted LMS5xx with a high volume of TCP SYN requests, overwhelming its resources and causing it to become unresponsive or unavailable for legitimate users." } ], "value": "A remote unprivileged attacker can sent multiple packages to the LMS5xx to disrupt its availability through a TCP SYN-based denial-of-service (DDoS) attack. \nBy exploiting this vulnerability, an attacker can flood the targeted LMS5xx with a high volume of TCP SYN requests, overwhelming its resources and causing it to become unresponsive or unavailable for legitimate users." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled Resource Consumption", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-24T18:05:15.123Z", "orgId": "a6863dd2-93fc-443d-bef1-79f0b5020988", "shortName": "SICK AG" }, "references": [ { "tags": [ "issue-tracking" ], "url": "https://sick.com/psirt" }, { "tags": [ "vendor-advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf" }, { "tags": [ "x_csaf" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json" } ], "source": { "discovery": "EXTERNAL" }, "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": true, "type": "text/html", "value": "Please make sure that you apply general security practices when operating the LMS5xx. The following General Security Practices and Operating Guidelines could mitigate the associated security risk. It is also recommended to apply the security practices listed in the LMS5xx hardening guide. \n" } ], "value": "Please make sure that you apply general security practices when operating the LMS5xx. The following General Security Practices and Operating Guidelines could mitigate the associated security risk. It is also recommended to apply the security practices listed in the LMS5xx hardening guide. \n" } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "a6863dd2-93fc-443d-bef1-79f0b5020988", "assignerShortName": "SICK AG", "cveId": "CVE-2023-4418", "datePublished": "2023-08-24T18:05:15.123Z", "dateReserved": "2023-08-18T13:09:11.346Z", "dateUpdated": "2024-12-09T14:12:17.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-2075
Vulnerability from cvelistv5
Published
2020-08-31 17:09
Modified
2024-08-04 06:54
Severity ?
EPSS score ?
Summary
Platform mechanism AutoIP allows remote attackers to reboot the device via a crafted packet in SICK AG solutions Bulkscan LMS111, Bulkscan LMS511, CLV62x – CLV65x, ICR890-3, LMS10x, LMS11x, LMS15x, LMS12x, LMS13x, LMS14x, LMS5xx, LMS53x, MSC800, RFH.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Bulkscan LMS111; Bulkscan LMS511; CLV62x – CLV65x; ICR890-3; LMS10x, LMS11x, LMS15x; LMS12x, LMS13x, LMS14x; LMS5xx, LMS53x; MSC800; RFH |
Version: All Versions < V1.04 Version: All Versions < V2.30 Version: All versions with Ethernet interface Version: All ICR890-3 and ICR890-3.5 devices all versions Version: All Versions < V2.0 Version: All Versions < V2.10 Version: All versions Version: All Versions < V4.10 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.593Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sick.com/de/en/service-and-support/the-sick-product-security-incident-response-team-sick-psirt/w/psirt/#advisories" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bulkscan LMS111; Bulkscan LMS511; CLV62x \u2013 CLV65x; ICR890-3; LMS10x, LMS11x, LMS15x; LMS12x, LMS13x, LMS14x; LMS5xx, LMS53x; MSC800; RFH", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All Versions \u003c V1.04" }, { "status": "affected", "version": "All Versions \u003c V2.30" }, { "status": "affected", "version": "All versions with Ethernet interface" }, { "status": "affected", "version": "All ICR890-3 and ICR890-3.5 devices all versions" }, { "status": "affected", "version": "All Versions \u003c V2.0" }, { "status": "affected", "version": "All Versions \u003c V2.10" }, { "status": "affected", "version": "All versions" }, { "status": "affected", "version": "All Versions \u003c V4.10" } ] } ], "descriptions": [ { "lang": "en", "value": "Platform mechanism AutoIP allows remote attackers to reboot the device via a crafted packet in SICK AG solutions Bulkscan LMS111, Bulkscan LMS511, CLV62x \u2013 CLV65x, ICR890-3, LMS10x, LMS11x, LMS15x, LMS12x, LMS13x, LMS14x, LMS5xx, LMS53x, MSC800, RFH." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-703", "description": "CWE-703: Improper Check or Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-31T17:09:07", "orgId": "a6863dd2-93fc-443d-bef1-79f0b5020988", "shortName": "SICK AG" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.sick.com/de/en/service-and-support/the-sick-product-security-incident-response-team-sick-psirt/w/psirt/#advisories" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@sick.de", "ID": "CVE-2020-2075", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bulkscan LMS111; Bulkscan LMS511; CLV62x \u2013 CLV65x; ICR890-3; LMS10x, LMS11x, LMS15x; LMS12x, LMS13x, LMS14x; LMS5xx, LMS53x; MSC800; RFH", "version": { "version_data": [ { "version_value": "All Versions \u003c V1.04" }, { "version_value": "All Versions \u003c V2.30" }, { "version_value": "All versions with Ethernet interface" }, { "version_value": "All ICR890-3 and ICR890-3.5 devices all versions" }, { "version_value": "All Versions \u003c V2.0" }, { "version_value": "All Versions \u003c V2.10" }, { "version_value": "All versions" }, { "version_value": "All Versions \u003c V4.10" }, { "version_value": "All versions" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Platform mechanism AutoIP allows remote attackers to reboot the device via a crafted packet in SICK AG solutions Bulkscan LMS111, Bulkscan LMS511, CLV62x \u2013 CLV65x, ICR890-3, LMS10x, LMS11x, LMS15x, LMS12x, LMS13x, LMS14x, LMS5xx, LMS53x, MSC800, RFH." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-703: Improper Check or Handling of Exceptional Conditions" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.sick.com/de/en/service-and-support/the-sick-product-security-incident-response-team-sick-psirt/w/psirt/#advisories", "refsource": "MISC", "url": "https://www.sick.com/de/en/service-and-support/the-sick-product-security-incident-response-team-sick-psirt/w/psirt/#advisories" } ] } } } }, "cveMetadata": { "assignerOrgId": "a6863dd2-93fc-443d-bef1-79f0b5020988", "assignerShortName": "SICK AG", "cveId": "CVE-2020-2075", "datePublished": "2020-08-31T17:09:07", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-08-04T06:54:00.593Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4420
Vulnerability from cvelistv5
Published
2023-08-24 18:11
Modified
2024-12-09 14:12
Severity ?
EPSS score ?
Summary
A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK LMS5xx. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the LMS5xx and the Client, and potentially manipulate the data being transmitted.
References
▼ | URL | Tags |
---|---|---|
https://sick.com/psirt | issue-tracking | |
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf | vendor-advisory | |
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json | x_csaf |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:24:04.690Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "issue-tracking", "x_transferred" ], "url": "https://sick.com/psirt" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf" }, { "tags": [ "x_csaf", "x_transferred" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:h:sick:lms5xx:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "lms5xx", "vendor": "sick", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-4420", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T19:59:02.293154Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-09T14:12:37.134Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "LMS5xx", "vendor": "SICK AG", "versions": [ { "status": "affected", "version": "all firmware versions" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": true, "type": "text/html", "value": "A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK LMS5xx. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the LMS5xx and the Client, and potentially manipulate the data being transmitted." } ], "value": "A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK LMS5xx. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the LMS5xx and the Client, and potentially manipulate the data being transmitted." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Cleartext Transmission of Sensitive Information", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-24T18:11:39.312Z", "orgId": "a6863dd2-93fc-443d-bef1-79f0b5020988", "shortName": "SICK AG" }, "references": [ { "tags": [ "issue-tracking" ], "url": "https://sick.com/psirt" }, { "tags": [ "vendor-advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf" }, { "tags": [ "x_csaf" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json" } ], "source": { "discovery": "EXTERNAL" }, "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nPlease make sure that you apply general security practices when operating the LMS5xx. The\nfollowing General Security Practices and Operating Guidelines could mitigate the associated security\nrisk. It is also recommended to apply the security practices listed in the LMS5xx hardening guide.\n\n\u003cbr\u003e" } ], "value": "\nPlease make sure that you apply general security practices when operating the LMS5xx. The\nfollowing General Security Practices and Operating Guidelines could mitigate the associated security\nrisk. It is also recommended to apply the security practices listed in the LMS5xx hardening guide.\n\n\n" } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "a6863dd2-93fc-443d-bef1-79f0b5020988", "assignerShortName": "SICK AG", "cveId": "CVE-2023-4420", "datePublished": "2023-08-24T18:11:39.312Z", "dateReserved": "2023-08-18T13:09:48.275Z", "dateUpdated": "2024-12-09T14:12:37.134Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-08-24 19:15
Modified
2024-11-21 08:35
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A remote unprivileged attacker can sent multiple packages to the LMS5xx to disrupt its availability through a TCP SYN-based denial-of-service (DDoS) attack.
By exploiting this vulnerability, an attacker can flood the targeted LMS5xx with a high volume of TCP SYN requests, overwhelming its resources and causing it to become unresponsive or unavailable for legitimate users.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sick | lms531_firmware | * | |
sick | lms531 | - | |
sick | lms511_firmware | * | |
sick | lms511 | - | |
sick | lms500_firmware | * | |
sick | lms500 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms531_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5943B624-D730-4679-8118-CD29CFB4CD1C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms531:-:*:*:*:*:*:*:*", "matchCriteriaId": "44AF5B79-0A15-4195-80F3-7304D8000D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms511_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F113FA6F-F3CC-43C7-97A4-D40F8F1F5E9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms511:-:*:*:*:*:*:*:*", "matchCriteriaId": "9ABE387A-9B29-43DE-A4F1-EDD3CB8BEB6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DF24DAB-D1E4-4B14-B9CE-BFB52F9BDBC7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms500:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8A37D4F-969C-4496-BD10-13C903A41305", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote unprivileged attacker can sent multiple packages to the LMS5xx to disrupt its availability through a TCP SYN-based denial-of-service (DDoS) attack. \nBy exploiting this vulnerability, an attacker can flood the targeted LMS5xx with a high volume of TCP SYN requests, overwhelming its resources and causing it to become unresponsive or unavailable for legitimate users." } ], "id": "CVE-2023-4418", "lastModified": "2024-11-21T08:35:06.343", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "psirt@sick.de", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-24T19:15:42.890", "references": [ { "source": "psirt@sick.de", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json" }, { "source": "psirt@sick.de", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf" }, { "source": "psirt@sick.de", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/psirt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/psirt" } ], "sourceIdentifier": "psirt@sick.de", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-24 19:15
Modified
2024-11-21 08:35
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
The LMS5xx uses hard-coded credentials, which potentially allow low-skilled
unauthorized remote attackers to reconfigure settings and /or disrupt the functionality of the device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sick | lms531_firmware | * | |
sick | lms531 | - | |
sick | lms511_firmware | * | |
sick | lms511 | - | |
sick | lms500_firmware | * | |
sick | lms500 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms531_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5943B624-D730-4679-8118-CD29CFB4CD1C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms531:-:*:*:*:*:*:*:*", "matchCriteriaId": "44AF5B79-0A15-4195-80F3-7304D8000D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms511_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F113FA6F-F3CC-43C7-97A4-D40F8F1F5E9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms511:-:*:*:*:*:*:*:*", "matchCriteriaId": "9ABE387A-9B29-43DE-A4F1-EDD3CB8BEB6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DF24DAB-D1E4-4B14-B9CE-BFB52F9BDBC7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms500:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8A37D4F-969C-4496-BD10-13C903A41305", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LMS5xx uses hard-coded credentials, which potentially allow low-skilled\nunauthorized remote attackers to reconfigure settings and /or disrupt the functionality of the device." } ], "id": "CVE-2023-4419", "lastModified": "2024-11-21T08:35:06.517", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "psirt@sick.de", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-24T19:15:43.077", "references": [ { "source": "psirt@sick.de", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json" }, { "source": "psirt@sick.de", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf" }, { "source": "psirt@sick.de", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/psirt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/psirt" } ], "sourceIdentifier": "psirt@sick.de", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-24 19:15
Modified
2024-11-21 08:01
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sick | lms531_firmware | * | |
sick | lms531 | - | |
sick | lms511_firmware | * | |
sick | lms511 | - | |
sick | lms500_firmware | * | |
sick | lms500 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms531_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5943B624-D730-4679-8118-CD29CFB4CD1C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms531:-:*:*:*:*:*:*:*", "matchCriteriaId": "44AF5B79-0A15-4195-80F3-7304D8000D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms511_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F113FA6F-F3CC-43C7-97A4-D40F8F1F5E9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms511:-:*:*:*:*:*:*:*", "matchCriteriaId": "9ABE387A-9B29-43DE-A4F1-EDD3CB8BEB6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DF24DAB-D1E4-4B14-B9CE-BFB52F9BDBC7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms500:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8A37D4F-969C-4496-BD10-13C903A41305", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password." } ], "id": "CVE-2023-31412", "lastModified": "2024-11-21T08:01:48.617", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "psirt@sick.de", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-24T19:15:33.977", "references": [ { "source": "psirt@sick.de", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json" }, { "source": "psirt@sick.de", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf" }, { "source": "psirt@sick.de", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/psirt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/psirt" } ], "sourceIdentifier": "psirt@sick.de", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-916" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-08-31 18:15
Modified
2024-11-21 05:24
Severity ?
Summary
Platform mechanism AutoIP allows remote attackers to reboot the device via a crafted packet in SICK AG solutions Bulkscan LMS111, Bulkscan LMS511, CLV62x – CLV65x, ICR890-3, LMS10x, LMS11x, LMS15x, LMS12x, LMS13x, LMS14x, LMS5xx, LMS53x, MSC800, RFH.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms111_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4E9439B-2153-4D66-8C8B-D7DED32BD81B", "versionEndExcluding": "1.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms111:-:*:*:*:*:*:*:*", "matchCriteriaId": "67011E35-C9AB-40C5-8DCC-29FA82A5F880", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms511_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33CCFE2A-61B1-4565-8504-F26A0412A0CD", "versionEndExcluding": "2.30", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms511:-:*:*:*:*:*:*:*", "matchCriteriaId": "9ABE387A-9B29-43DE-A4F1-EDD3CB8BEB6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:clv620_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "97320450-2AEC-4E4A-9399-E2115AC4315A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:clv620:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A58D587-1663-4E99-85DA-80DCBF0486F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:clv622_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC9D5448-F17A-4042-A8F8-EE261F3C3E9E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:clv622:-:*:*:*:*:*:*:*", "matchCriteriaId": "8559D0CC-2CBE-4E4B-9FF9-43AECFFD27C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:clv621_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D07761A7-0CFE-4F43-9ADC-FCC28FA5ECFE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:clv621:-:*:*:*:*:*:*:*", "matchCriteriaId": "5189BEF6-17B2-4F77-B8E3-85B00D977CBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:icr890-3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D9C80C4-52DA-40E2-8C38-8014F616D1AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:icr890-3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3A05BC1-4E78-494B-B6E2-5F1E721CC50B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:msc800_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E01267B-42D2-4F29-BFEF-6AD37D48582A", "versionEndExcluding": "4.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:msc800:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A09CB55-1368-4623-8EB5-BAB2D57E4BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:rfh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7074A993-231B-45B9-ACC8-14594D420F16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:rfh:-:*:*:*:*:*:*:*", "matchCriteriaId": "983F3C0E-7C67-47EA-BD54-8F3B7BF5493A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:clv650_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5A30918-7CA4-4C05-896B-20426A30D86F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:clv650:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3FB3E2F-1637-4861-AF22-D4BF59A7906D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:clv651_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7BBD455-DA1C-4E86-BC99-143B22D4448F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:clv651:-:*:*:*:*:*:*:*", "matchCriteriaId": "2313BBE6-6679-4073-9FC0-51FBE9F0A8B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:clv631_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCA9ED42-6E5A-4456-B099-D08EB6ABB0DD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:clv631:-:*:*:*:*:*:*:*", "matchCriteriaId": "0893F42F-EAB9-4D3D-9F94-4892C6890BDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:clv630_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99BD27B2-E055-4C52-A817-577384497F87", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:clv630:-:*:*:*:*:*:*:*", "matchCriteriaId": "42DC25E7-8C55-470A-B451-591A03CA2A40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:clv632_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DEE9E96-1DA5-4EBD-8847-EAE418215C11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:clv632:-:*:*:*:*:*:*:*", "matchCriteriaId": "82B0632E-A55F-4EA8-A132-0D11CE38FDC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:clv640_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B22CDFFC-AF15-4883-95F4-CE4D191EC482", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:clv640:-:*:*:*:*:*:*:*", "matchCriteriaId": "C721EE7D-D046-4AEF-80FA-217B5684419E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:clv642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E632CA7-141B-495B-8A57-BC06867842AA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:clv642:-:*:*:*:*:*:*:*", "matchCriteriaId": "651F0D5C-F7DA-41A6-B3C3-B48C0662C855", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "118835C2-4939-4601-935A-032028D58E84", "versionEndExcluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms100:-:*:*:*:*:*:*:*", "matchCriteriaId": "31A7D324-DBC8-4EBC-8AA2-E42C33E5758C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms101_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF828DD0-095A-4784-8D1A-87F3CF361297", "versionEndExcluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms101:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B5ED872-0E79-4901-96D9-27CBA55DAEA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms111_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D69045C1-7EF8-4F8E-8940-1171DB40F9D9", "versionEndExcluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms111:-:*:*:*:*:*:*:*", "matchCriteriaId": "67011E35-C9AB-40C5-8DCC-29FA82A5F880", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms153_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63031071-D70A-440F-8735-801AEEC0CC0D", "versionEndExcluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms153:-:*:*:*:*:*:*:*", "matchCriteriaId": "54A544C0-9ABD-46AD-B193-87C6EF7FF133", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms151_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A61E7FD6-BB7F-4FEB-A82F-6493B993C7D5", "versionEndExcluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms151:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D01238F-0776-493A-AD81-D0E14D2A4C71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms133_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2054C96-9A9C-4FC8-8E8C-7D315BA73234", "versionEndExcluding": "2.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms133:-:*:*:*:*:*:*:*", "matchCriteriaId": "B48111FA-BB11-4FF9-9CE0-42459229A60C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms142_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A83F4309-6C29-48F6-A276-95E5BC8330FA", "versionEndExcluding": "2.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms142:-:*:*:*:*:*:*:*", "matchCriteriaId": "43602F20-5065-4965-BFC9-BFA581ED5ECC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms143_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55215A7C-B7D8-4D94-84FA-26939D9FAD1F", "versionEndExcluding": "2.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms143:-:*:*:*:*:*:*:*", "matchCriteriaId": "02F0ED4E-1AB0-4EAB-8D3F-E318DE3D51F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms131_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9543231B-6C33-4C66-95D0-1D2B49063F11", "versionEndExcluding": "2.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms131:-:*:*:*:*:*:*:*", "matchCriteriaId": "9378A66C-EF01-4DFA-9E8C-4231FE0E8914", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms121_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8143104-4230-42EE-BA3C-73C10CA48667", "versionEndExcluding": "2.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms121:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9B7CE13-0E33-439B-866B-C0CD365919C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms123_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D3E89AC-85E2-4279-87AC-31D89381F263", "versionEndExcluding": "2.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms123:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB011CA-769D-4335-A57A-62B77AD9E0FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms122_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCA825F2-A103-429B-BD61-08634033BA12", "versionEndExcluding": "2.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms122:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C689D72-3D25-4C3F-BBF5-15691D18F9BA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms141_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DB1AB8D-8116-46C1-8125-10DED10DE830", "versionEndExcluding": "2.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms141:-:*:*:*:*:*:*:*", "matchCriteriaId": "24237BC0-BE8D-4EF8-A3C4-BEE1A8373481", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms511_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F113FA6F-F3CC-43C7-97A4-D40F8F1F5E9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms511:-:*:*:*:*:*:*:*", "matchCriteriaId": "9ABE387A-9B29-43DE-A4F1-EDD3CB8BEB6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms531_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5943B624-D730-4679-8118-CD29CFB4CD1C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms531:-:*:*:*:*:*:*:*", "matchCriteriaId": "44AF5B79-0A15-4195-80F3-7304D8000D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DF24DAB-D1E4-4B14-B9CE-BFB52F9BDBC7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms500:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8A37D4F-969C-4496-BD10-13C903A41305", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:icr890-3.5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D253F05-FCF4-4E90-BC55-CC838C2297F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:icr890-3.5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8A72B7-8433-4EC6-8384-89A52E519A58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Platform mechanism AutoIP allows remote attackers to reboot the device via a crafted packet in SICK AG solutions Bulkscan LMS111, Bulkscan LMS511, CLV62x \u2013 CLV65x, ICR890-3, LMS10x, LMS11x, LMS15x, LMS12x, LMS13x, LMS14x, LMS5xx, LMS53x, MSC800, RFH." }, { "lang": "es", "value": "El mecanismo de plataforma AutoIP permite a atacantes remotos reiniciar el dispositivo por medio de un paquete dise\u00f1ado en las soluciones de SICK AG Bulkscan LMS111, Bulkscan LMS511, CLV62x - CLV65x, ICR890-3, LMS10x, LMS11x, LMS15x, LMS12x, LMS13x, LMS14x, LMS5xx, LMS53x, RFH" } ], "id": "CVE-2020-2075", "lastModified": "2024-11-21T05:24:33.753", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-08-31T18:15:13.170", "references": [ { "source": "psirt@sick.de", "tags": [ "Vendor Advisory" ], "url": "https://www.sick.com/de/en/service-and-support/the-sick-product-security-incident-response-team-sick-psirt/w/psirt/#advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sick.com/de/en/service-and-support/the-sick-product-security-incident-response-team-sick-psirt/w/psirt/#advisories" } ], "sourceIdentifier": "psirt@sick.de", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-703" } ], "source": "psirt@sick.de", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-24 19:15
Modified
2024-11-21 08:35
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
7.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Summary
A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK LMS5xx. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the LMS5xx and the Client, and potentially manipulate the data being transmitted.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sick | lms531_firmware | * | |
sick | lms531 | - | |
sick | lms511_firmware | * | |
sick | lms511 | - | |
sick | lms500_firmware | * | |
sick | lms500 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms531_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5943B624-D730-4679-8118-CD29CFB4CD1C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms531:-:*:*:*:*:*:*:*", "matchCriteriaId": "44AF5B79-0A15-4195-80F3-7304D8000D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms511_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F113FA6F-F3CC-43C7-97A4-D40F8F1F5E9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms511:-:*:*:*:*:*:*:*", "matchCriteriaId": "9ABE387A-9B29-43DE-A4F1-EDD3CB8BEB6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sick:lms500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DF24DAB-D1E4-4B14-B9CE-BFB52F9BDBC7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:sick:lms500:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8A37D4F-969C-4496-BD10-13C903A41305", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK LMS5xx. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the LMS5xx and the Client, and potentially manipulate the data being transmitted." } ], "id": "CVE-2023-4420", "lastModified": "2024-11-21T08:35:06.670", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "psirt@sick.de", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-24T19:15:43.183", "references": [ { "source": "psirt@sick.de", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json" }, { "source": "psirt@sick.de", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf" }, { "source": "psirt@sick.de", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/psirt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sick.com/psirt" } ], "sourceIdentifier": "psirt@sick.de", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-311" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }