SICK SOPAS ET before version 4.8.0 allows attackers to wrap any executable file into an SDD and provide this to a SOPAS ET user. When a user starts the emulator the executable is run without further checks.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://sick.com/psirt#advisories |
History
No history.
MITRE
Status: PUBLISHED
Assigner: SICK AG
Published: 2021-12-17T16:09:59
Updated: 2024-08-03T23:17:29.571Z
Reserved: 2021-05-10T00:00:00
Link: CVE-2021-32497
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-12-17T17:15:12.647
Modified: 2024-11-21T06:07:09.167
Link: CVE-2021-32497
Redhat
No data.