A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK EventCam App. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the EventCam App and the Client, and potentially manipulate the data being transmitted.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-35721 A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK EventCam App. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the EventCam App and the Client, and potentially manipulate the data being transmitted.
Fixes

Solution

No solution given by the vendor.


Workaround

Please make sure that you apply general security practices when operating the EventCam App. The following General Security Practices and Operating Guidelines could mitigate the associated security risk.

History

Wed, 11 Dec 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2024-12-11T20:31:59.734Z

Reserved: 2023-04-27T18:35:47.418Z

Link: CVE-2023-31410

cve-icon Vulnrichment

Updated: 2024-08-02T14:53:31.061Z

cve-icon NVD

Status : Modified

Published: 2023-06-19T15:15:09.173

Modified: 2024-11-21T08:01:48.377

Link: CVE-2023-31410

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.