Platform mechanism AutoIP allows remote attackers to reboot the device via a crafted packet in SICK AG solutions Bulkscan LMS111, Bulkscan LMS511, CLV62x – CLV65x, ICR890-3, LMS10x, LMS11x, LMS15x, LMS12x, LMS13x, LMS14x, LMS5xx, LMS53x, MSC800, RFH.

Project Subscriptions

Vendors Products
Clv620 Firmware Subscribe
Clv621 Firmware Subscribe
Clv622 Firmware Subscribe
Clv630 Firmware Subscribe
Clv631 Firmware Subscribe
Clv632 Firmware Subscribe
Clv640 Firmware Subscribe
Clv642 Firmware Subscribe
Clv650 Firmware Subscribe
Clv651 Firmware Subscribe
Icr890-3 Subscribe
Icr890-3.5 Subscribe
Icr890-3.5 Firmware Subscribe
Icr890-3 Firmware Subscribe
Lms100 Firmware Subscribe
Lms101 Firmware Subscribe
Lms111 Firmware Subscribe
Lms121 Firmware Subscribe
Lms122 Firmware Subscribe
Lms123 Firmware Subscribe
Lms131 Firmware Subscribe
Lms133 Firmware Subscribe
Lms141 Firmware Subscribe
Lms142 Firmware Subscribe
Lms143 Firmware Subscribe
Lms151 Firmware Subscribe
Lms153 Firmware Subscribe
Lms500 Firmware Subscribe
Lms511 Firmware Subscribe
Lms531 Firmware Subscribe
Msc800 Firmware Subscribe
Rfh Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-22101 Platform mechanism AutoIP allows remote attackers to reboot the device via a crafted packet in SICK AG solutions Bulkscan LMS111, Bulkscan LMS511, CLV62x – CLV65x, ICR890-3, LMS10x, LMS11x, LMS15x, LMS12x, LMS13x, LMS14x, LMS5xx, LMS53x, MSC800, RFH.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2024-08-04T06:54:00.593Z

Reserved: 2019-12-04T00:00:00

Link: CVE-2020-2075

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-08-31T18:15:13.170

Modified: 2024-11-21T05:24:33.753

Link: CVE-2020-2075

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses