SICK Lector8xx and InspectorP8xx vulnerable for code execution
The vulnerability may allow a remote low priviledged attacker to run arbitrary shell commands by manipulating the firmware file and uploading it to the device.
Description: CWE-924 Improper Enforcement of Message Integrity During Transmission in a Communication Channel
Metrics
Version
Base score
Base severity
Vector
3.1
8.8
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version:3.1
Base score:8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Users are strongly recommended to upgrade to the latest release of the Lector8xx (>=2.4.0)
and the InspectorP8xx (>=3.11.1) respectively that includes a patch for the vulnerability. It is also
recommended to set a secure password, please refer to the respective operating instructions, linked in
the reference section.