The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password.
Fixes

Solution

No solution given by the vendor.


Workaround

Please make sure that you apply general security practices when operating the LMS5xx. The following General Security Practices and Operating Guidelines could mitigate the associated security risk. It is also recommended to apply the security practices listed in the LMS5xx hardening guide.

History

Mon, 09 Dec 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Sick lms5xx
CPEs cpe:2.3:h:sick_ag:lms5xx:*:*:*:*:*:*:*:* cpe:2.3:h:sick:lms5xx:*:*:*:*:*:*:*:*
Vendors & Products Sick Ag
Sick Ag lms5xx
Sick lms5xx

Thu, 03 Oct 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Sick Ag
Sick Ag lms5xx
CPEs cpe:2.3:h:sick_ag:lms5xx:*:*:*:*:*:*:*:*
Vendors & Products Sick Ag
Sick Ag lms5xx
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2024-12-09T14:12:04.011Z

Reserved: 2023-04-27T18:35:47.418Z

Link: CVE-2023-31412

cve-icon Vulnrichment

Updated: 2024-08-02T14:53:30.758Z

cve-icon NVD

Status : Modified

Published: 2023-08-24T19:15:33.977

Modified: 2024-11-21T08:01:48.617

Link: CVE-2023-31412

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.