FKIE_CVE-2024-10025

Vulnerability from fkie_nvd - Published: 2024-10-17 10:15 - Updated: 2024-10-18 12:52
Severity ?
Summary
A vulnerability in the .sdd file allows an attacker to read default passwords stored in plain text within the code. By exploiting these plaintext credentials, an attacker can log into affected SICK products as an “Authorized Client” if the customer has not changed the default password.
Impacted products
Vendor Product Version

{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the .sdd file allows an attacker to read default passwords stored in plain text within the code. By exploiting these plaintext credentials, an attacker can log into affected SICK products as an \u201cAuthorized Client\u201d if the customer has not changed the default password."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el archivo .sdd permite a un atacante leer las contrase\u00f1as predeterminadas almacenadas en texto plano dentro del c\u00f3digo. Al explotar estas credenciales en texto plano, un atacante puede iniciar sesi\u00f3n en los productos SICK afectados como un \"cliente autorizado\" si el cliente no ha cambiado la contrase\u00f1a predeterminada."
    }
  ],
  "id": "CVE-2024-10025",
  "lastModified": "2024-10-18T12:52:33.507",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.2,
        "source": "psirt@sick.de",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-10-17T10:15:03.127",
  "references": [
    {
      "source": "psirt@sick.de",
      "url": "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF"
    },
    {
      "source": "psirt@sick.de",
      "url": "https://sick.com/psirt"
    },
    {
      "source": "psirt@sick.de",
      "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
    },
    {
      "source": "psirt@sick.de",
      "url": "https://www.first.org/cvss/calculator/3.1"
    },
    {
      "source": "psirt@sick.de",
      "url": "https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0003.json"
    },
    {
      "source": "psirt@sick.de",
      "url": "https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0003.pdf"
    }
  ],
  "sourceIdentifier": "psirt@sick.de",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-798"
        }
      ],
      "source": "psirt@sick.de",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…