Use of Password Hash Instead of Password for Authentication in SICK FTMg AIR
FLOW SENSOR with Partnumbers 1100214, 1100215, 1100216, 1120114, 1120116, 1122524, 1122526
allows an unprivileged remote attacker to use a password hash instead of an actual password to login
to a valid user account via the REST interface.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-27550 | Use of Password Hash Instead of Password for Authentication in SICK FTMg AIR FLOW SENSOR with Partnumbers 1100214, 1100215, 1100216, 1120114, 1120116, 1122524, 1122526 allows an unprivileged remote attacker to use a password hash instead of an actual password to login to a valid user account via the REST interface. |
Solution
No solution given by the vendor.
Workaround
Please make sure that you apply general security practices when operating the SICK FTMg like network segmentation. The following General Security Practices and Operating Guidelines could mitigate the associated security risk.
Thu, 23 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-01-23T19:09:01.324Z
Reserved: 2023-01-12T04:07:53.940Z
Link: CVE-2023-23450
Updated: 2024-08-02T10:28:40.963Z
Status : Modified
Published: 2023-05-15T11:15:09.407
Modified: 2024-11-21T07:46:13.390
Link: CVE-2023-23450
No data.
OpenCVE Enrichment
No data.
EUVD