Vulnerability identifier: #VU77926
Vulnerability risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-306
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
SICK FX0-GENT00000
Hardware solutions /
Routers & switches, VoIP, GSM, etc
SICK FX0-GENT00010
Hardware solutions /
Routers & switches, VoIP, GSM, etc
SICK FX0-GENT00030
Hardware solutions /
Routers & switches, VoIP, GSM, etc
SICK FX0-GMOD00000
Hardware solutions /
Routers & switches, VoIP, GSM, etc
SICK FX0-GMOD00010
Hardware solutions /
Routers & switches, VoIP, GSM, etc
SICK FX0-GPNT00000
Hardware solutions /
Routers & switches, VoIP, GSM, etc
SICK FX0-GPNT00010
Hardware solutions /
Routers & switches, VoIP, GSM, etc
SICK FX0-GPNT00030
Hardware solutions /
Routers & switches, VoIP, GSM, etc
SICK UE410-EN1 FLEXI
Hardware solutions /
Routers & switches, VoIP, GSM, etc
SICK UE410-EN3 FLEXI
Hardware solutions /
Routers & switches, VoIP, GSM, etc
SICK UE410-EN4 FLEXI
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Vendor: Sick AG
Description
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to missing authentication for critical function. A remote attacker can send a broadcasted UDP packet and change the IP settings of the affected device.
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versions
SICK FX0-GENT00000: All versions
SICK FX0-GENT00010: All versions
SICK FX0-GENT00030: All versions
SICK FX0-GMOD00000: All versions
SICK FX0-GMOD00010: All versions
SICK FX0-GPNT00000: All versions
SICK FX0-GPNT00010: All versions
SICK FX0-GPNT00030: All versions
SICK UE410-EN1 FLEXI: All versions
SICK UE410-EN3 FLEXI: All versions
SICK UE410-EN4 FLEXI: All versions
External links
https://sick.com/.well-known/csaf/white/2023/sca-2023-0003.json
https://sick.com/psirt
https://sick.com/.well-known/csaf/white/2023/sca-2023-0003.pdf
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.