Due to missing input validation during one step of the firmware update process, the product
is vulnerable to remote code execution. With network access and the user level ”Service”, an attacker
can execute arbitrary system commands in the root user’s contexts.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-33529 Due to missing input validation during one step of the firmware update process, the product is vulnerable to remote code execution. With network access and the user level ”Service”, an attacker can execute arbitrary system commands in the root user’s contexts.
Fixes

Solution

For InspectorP61x and InspectorP62x: Customers are strongly recommended to upgrade to the latest release.


Workaround

For TiM3xx:  We recommend updating the firmware only in a trusted environment.

History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00903}

epss

{'score': 0.01137}


Mon, 09 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Sick
Sick inspector61x Firmware
Sick inspector62x Firmware
Sick tim3xx
CPEs cpe:2.3:a:sick:tim3xx:*:*:*:*:*:*:*:*
cpe:2.3:o:sick:inspector61x_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:sick:inspector62x_firmware:-:*:*:*:*:*:*:*
Vendors & Products Sick
Sick inspector61x Firmware
Sick inspector62x Firmware
Sick tim3xx
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Dec 2024 12:30:00 +0000

Type Values Removed Values Added
Description Due to missing input validation during one step of the firmware update process, the product is vulnerable to remote code execution. With network access and the user level ”Service”, an attacker can execute arbitrary system commands in the root user’s contexts.
Title SICK InspectorP61x, SICK InspectorP62x and SICK TiM3xx are vulnerable for remote code execution
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2024-12-09T14:47:30.064Z

Reserved: 2024-11-04T13:06:55.136Z

Link: CVE-2024-10771

cve-icon Vulnrichment

Updated: 2024-12-09T14:47:22.147Z

cve-icon NVD

Status : Received

Published: 2024-12-06T13:15:04.797

Modified: 2024-12-06T13:15:04.797

Link: CVE-2024-10771

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.