Use of Password Hash Instead of Password for Authentication in SICK FTMg AIR
FLOW SENSOR with Partnumbers 1100214, 1100215, 1100216, 1120114, 1120116, 1122524, 1122526
allows an unprivileged remote attacker to use a password hash instead of an actual password to login
to a valid user account via the REST interface.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-27550 Use of Password Hash Instead of Password for Authentication in SICK FTMg AIR FLOW SENSOR with Partnumbers 1100214, 1100215, 1100216, 1120114, 1120116, 1122524, 1122526 allows an unprivileged remote attacker to use a password hash instead of an actual password to login to a valid user account via the REST interface.
Fixes

Solution

No solution given by the vendor.


Workaround

Please make sure that you apply general security practices when operating the SICK FTMg like network segmentation. The following General Security Practices and Operating Guidelines could mitigate the associated security risk.

History

Thu, 23 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2025-01-23T19:09:01.324Z

Reserved: 2023-01-12T04:07:53.940Z

Link: CVE-2023-23450

cve-icon Vulnrichment

Updated: 2024-08-02T10:28:40.963Z

cve-icon NVD

Status : Modified

Published: 2023-05-15T11:15:09.407

Modified: 2024-11-21T07:46:13.390

Link: CVE-2023-23450

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.