cve-2024-10025
Vulnerability from cvelistv5
Published
2024-10-17 09:58
Modified
2024-10-17 16:33
Severity ?
Summary
Vulnerability in SICK CLV6xx, SICK Lector6xx and SICK RFx6xx
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:sick:lector611_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:lector610_firmware:*:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:lector620_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:lector621_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:lector622_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:lector630_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:lector632_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:lector640_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:lector642_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:lector650_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:lector651_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:lector654_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:clv620_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:clv621_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:clv622_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:clv630_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:clv631_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:clv632_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:clv640_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:clv642_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:clv650_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:clv651_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu610-10600_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu610-10601_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu610-10603_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu610-10604_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu610-10605_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu610-10607_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu610-10609_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu610-10610_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu610-10613_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu610-10614_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu610-10618_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu610-10700_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu620-10100_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu620-10101_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu620-10102_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu620-10103_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu620-10104_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu620-10105_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu620-10107_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu620-10108_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu620-10111_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu620-10114_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu620-10118_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu620-10400_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu620-10401_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu620-10500_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu620-10501_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu620-10503_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu620-10504_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:sick:rfu620-10507_firmware:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "rfu620-10507_firmware",
            "vendor": "sick",
            "versions": [
              {
                "lessThan": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-10025",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-17T13:41:03.974704Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-17T16:33:53.645Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "SICK CLV6xx",
          "vendor": "SICK AG",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "SICK Lector6xx",
          "vendor": "SICK AG",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "SICK RFx6xx",
          "vendor": "SICK AG",
          "versions": [
            {
              "status": "affected",
              "version": "all versions"
            }
          ]
        }
      ],
      "datePublic": "2024-10-17T09:44:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A vulnerability in the .sdd file allows an attacker to read default passwords stored in plain text within the code. By exploiting these plaintext credentials, an attacker can log into affected SICK products as an \u201cAuthorized Client\u201d if the customer has not changed the default password."
            }
          ],
          "value": "A vulnerability in the .sdd file allows an attacker to read default passwords stored in plain text within the code. By exploiting these plaintext credentials, an attacker can log into affected SICK products as an \u201cAuthorized Client\u201d if the customer has not changed the default password."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-798",
              "description": "CWE-798 Use of Hard-coded Credentials",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-17T09:58:03.111Z",
        "orgId": "a6863dd2-93fc-443d-bef1-79f0b5020988",
        "shortName": "SICK AG"
      },
      "references": [
        {
          "tags": [
            "x_SICK PSIRT Webseite"
          ],
          "url": "https://sick.com/psirt"
        },
        {
          "tags": [
            "x_ICS-CERT recommended practices on Industrial Security"
          ],
          "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
        },
        {
          "tags": [
            "x_SICK Operating Guidelines"
          ],
          "url": "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF"
        },
        {
          "tags": [
            "x_CVSS v3.1 Calculator"
          ],
          "url": "https://www.first.org/cvss/calculator/3.1"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0003.pdf"
        },
        {
          "tags": [
            "vendor-advisory",
            "x_csaf"
          ],
          "url": "https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0003.json"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Customers are strongly advised to change their default passwords.\u003cbr\u003e"
            }
          ],
          "value": "Customers are strongly advised to change their default passwords."
        }
      ],
      "source": {
        "advisory": "sca-2024-0003",
        "discovery": "INTERNAL"
      },
      "timeline": [
        {
          "lang": "en",
          "time": "2024-10-17T09:53:00.000Z",
          "value": "1: Initial version"
        }
      ],
      "title": "Vulnerability in SICK CLV6xx, SICK Lector6xx and SICK RFx6xx",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a6863dd2-93fc-443d-bef1-79f0b5020988",
    "assignerShortName": "SICK AG",
    "cveId": "CVE-2024-10025",
    "datePublished": "2024-10-17T09:58:03.111Z",
    "dateReserved": "2024-10-16T07:45:23.632Z",
    "dateUpdated": "2024-10-17T16:33:53.645Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-10025\",\"sourceIdentifier\":\"psirt@sick.de\",\"published\":\"2024-10-17T10:15:03.127\",\"lastModified\":\"2024-10-18T12:52:33.507\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the .sdd file allows an attacker to read default passwords stored in plain text within the code. By exploiting these plaintext credentials, an attacker can log into affected SICK products as an \u201cAuthorized Client\u201d if the customer has not changed the default password.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el archivo .sdd permite a un atacante leer las contrase\u00f1as predeterminadas almacenadas en texto plano dentro del c\u00f3digo. Al explotar estas credenciales en texto plano, un atacante puede iniciar sesi\u00f3n en los productos SICK afectados como un \\\"cliente autorizado\\\" si el cliente no ha cambiado la contrase\u00f1a predeterminada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@sick.de\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"psirt@sick.de\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-798\"}]}],\"references\":[{\"url\":\"https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF\",\"source\":\"psirt@sick.de\"},{\"url\":\"https://sick.com/psirt\",\"source\":\"psirt@sick.de\"},{\"url\":\"https://www.cisa.gov/resources-tools/resources/ics-recommended-practices\",\"source\":\"psirt@sick.de\"},{\"url\":\"https://www.first.org/cvss/calculator/3.1\",\"source\":\"psirt@sick.de\"},{\"url\":\"https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0003.json\",\"source\":\"psirt@sick.de\"},{\"url\":\"https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0003.pdf\",\"source\":\"psirt@sick.de\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.