SCA-2026-0004
Vulnerability from csaf_sick - Published: 2026-02-13 14:00 - Updated: 2026-02-13 14:00Summary
Eclipse Cyclone DDS Vulnerabilities have no impact on SICK picoScan150 & SICK picoScan120 products
Notes
summary
Eclipse Cyclone DDS has known vulnerabilities and is used in SICK picoScan150 and SICK picoScan120 products starting with version 2.2.0. A current analysis confirms that the identified vulnerabilities (CVE-2025-67109 and CVE-2023-24011) do not affect SICK picoScan150 and SICK picoScan120. Both vulnerabilities relate exclusively to certificate-based security features of ROS 2 / DDS, which are not supported on SICK picoScan150 and SICK picoScan120 devices and cannot be enabled by customers. At this time, there is no indication of any potential risk to SICK picoScan150 and SICK picoScan120 related to these two vulnerabilities.
General Security Measures
As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.
Vulnerability Classification
SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer’s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "summary",
"text": "Eclipse Cyclone DDS has known vulnerabilities and is used in SICK picoScan150 and SICK picoScan120 products starting with version 2.2.0. A current analysis confirms that the identified vulnerabilities (CVE-2025-67109 and CVE-2023-24011) do not affect SICK picoScan150 and SICK picoScan120. Both vulnerabilities relate exclusively to certificate-based security features of ROS 2 / DDS, which are not supported on SICK picoScan150 and SICK picoScan120 devices and cannot be enabled by customers. At this time, there is no indication of any potential risk to SICK picoScan150 and SICK picoScan120 related to these two vulnerabilities.",
"title": "summary"
},
{
"category": "general",
"text": "As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.",
"title": "General Security Measures"
},
{
"category": "general",
"text": "SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer\u2019s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.",
"title": "Vulnerability Classification"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@sick.de",
"issuing_authority": "SICK AG issues and issues in EHS products (when related to the Endress+Hauser SICK (EHS) joint venture).",
"name": "SICK PSIRT",
"namespace": "https://www.sick.com/psirt"
},
"references": [
{
"summary": "SICK PSIRT Security Advisories",
"url": "https://www.sick.com/psirt"
},
{
"summary": "SICK Operating Guidelines",
"url": "https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf"
},
{
"summary": "ICS-CERT recommended practices on Industrial Security",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"summary": "CVSS v3.1 Calculator",
"url": "https://www.first.org/cvss/calculator/3.1"
},
{
"category": "self",
"summary": "The canonical URL.",
"url": "https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0004.json"
}
],
"title": "Eclipse Cyclone DDS Vulnerabilities have no impact on SICK picoScan150 \u0026 SICK picoScan120 products",
"tracking": {
"current_release_date": "2026-02-13T14:00:00.000Z",
"generator": {
"date": "2026-02-13T08:40:14.369Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.43"
}
},
"id": "SCA-2026-0004",
"initial_release_date": "2026-02-13T14:00:00.000Z",
"revision_history": [
{
"date": "2026-02-13T14:00:00.000Z",
"number": "1",
"summary": "Initial version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICK picoScan150 all versions",
"product_id": "CSAFPID-0001",
"product_identification_helper": {
"skus": [
"1134607",
"1134608",
"1134609",
"1134610",
"1141395",
"1141396",
"1141397",
"1142269",
"1142270",
"1142272",
"1142273"
]
}
}
}
],
"category": "product_name",
"name": "picoScan150"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICK picoScan120 all versions",
"product_id": "CSAFPID-0004",
"product_identification_helper": {
"skus": [
"1141751"
]
}
}
}
],
"category": "product_name",
"name": "picoScan120"
}
],
"category": "product_family",
"name": "picoScan100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=2.2.0",
"product": {
"name": "SICK picoScan150 firmware \u003e=2.2.0",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "picoScan150 firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=2.2.0",
"product": {
"name": "SICK picoScan150 firmware \u003e=2.2.0",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "picoScan120 firmware"
}
],
"category": "vendor",
"name": "SICK AG"
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "SICK picoScan150 with firmware \u003e=2.2.0",
"product_id": "CSAFPID-0003"
},
"product_reference": "CSAFPID-0002",
"relates_to_product_reference": "CSAFPID-0001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "SICK picoScan120 with firmware \u003e=2.2.0",
"product_id": "CSAFPID-0006"
},
"product_reference": "CSAFPID-0005",
"relates_to_product_reference": "CSAFPID-0004"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-24011",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "An attacker can arbitrarily craft malicious DDS Participants (or ROS 2 Nodes) with valid certificates to compromise and get full control of the attacked secure DDS databus system by exploiting vulnerable attributes in the configuration of PKCS#7 certificate\u2019s validation. This is caused by a non-compliant implementation of permission document verification used by some DDS vendors. Specifically, an improper use of the OpenSSL PKCS7_verify function used to validate S/MIME signatures.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0003",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0003"
]
}
],
"title": "CVE-2023-24011"
},
{
"cve": "CVE-2025-67109",
"cwe": {
"id": "CWE-298",
"name": "Improper Validation of Certificate Expiration"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Improper verification of the time certificate in Eclipse Cyclone DDS before v0.10.5 allows attackers to bypass certificate checks and execute commands with System privileges.",
"title": "Summary"
}
],
"product_status": {
"known_not_affected": [
"CSAFPID-0003",
"CSAFPID-0006"
]
},
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 10,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"temporalScore": 10,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0003"
]
}
],
"title": "CVE-2025-67109"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…