Due to missing input validation during one step of the firmware update process, the product is vulnerable to remote code execution. With network access and the user level ”Service”, an attacker can execute arbitrary system commands in the root user’s contexts.
History

Mon, 09 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Sick
Sick inspector61x Firmware
Sick inspector62x Firmware
Sick tim3xx
CPEs cpe:2.3:a:sick:tim3xx:*:*:*:*:*:*:*:*
cpe:2.3:o:sick:inspector61x_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:sick:inspector62x_firmware:-:*:*:*:*:*:*:*
Vendors & Products Sick
Sick inspector61x Firmware
Sick inspector62x Firmware
Sick tim3xx
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Dec 2024 12:30:00 +0000

Type Values Removed Values Added
Description Due to missing input validation during one step of the firmware update process, the product is vulnerable to remote code execution. With network access and the user level ”Service”, an attacker can execute arbitrary system commands in the root user’s contexts.
Title SICK InspectorP61x, SICK InspectorP62x and SICK TiM3xx are vulnerable for remote code execution
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published: 2024-12-06T12:24:40.610Z

Updated: 2024-12-09T14:47:30.064Z

Reserved: 2024-11-04T13:06:55.136Z

Link: CVE-2024-10771

cve-icon Vulnrichment

Updated: 2024-12-09T14:47:22.147Z

cve-icon NVD

Status : Received

Published: 2024-12-06T13:15:04.797

Modified: 2024-12-06T13:15:04.797

Link: CVE-2024-10771

cve-icon Redhat

No data.