Lua apps can be deployed, removed, started, reloaded or stopped without authorization via AppManager. This allows an attacker to remove legitimate apps creating a DoS attack, read and write files or load apps that use all features of the product available to a customer.
History

Mon, 09 Dec 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Sick
Sick inspector61x Firmware
Sick inspector62x Firmware
CPEs cpe:2.3:a:lua:lua:-:*:*:*:*:*:*:* cpe:2.3:o:sick:inspector61x_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:sick:inspector62x_firmware:-:*:*:*:*:*:*:*
Vendors & Products Lua
Lua lua
Sick
Sick inspector61x Firmware
Sick inspector62x Firmware

Fri, 06 Dec 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Lua
Lua lua
CPEs cpe:2.3:a:lua:lua:-:*:*:*:*:*:*:*
Vendors & Products Lua
Lua lua
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Dec 2024 13:00:00 +0000

Type Values Removed Values Added
Description Lua apps can be deployed, removed, started, reloaded or stopped without authorization via AppManager. This allows an attacker to remove legitimate apps creating a DoS attack, read and write files or load apps that use all features of the product available to a customer.
Title SICK InspectorP61x and SICK InspectorP62x: missing authentication
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published: 2024-12-06T12:38:55.781Z

Updated: 2024-12-09T14:06:40.506Z

Reserved: 2024-11-04T13:08:11.677Z

Link: CVE-2024-10776

cve-icon Vulnrichment

Updated: 2024-12-06T18:52:22.793Z

cve-icon NVD

Status : Received

Published: 2024-12-06T13:15:06.147

Modified: 2024-12-06T13:15:06.147

Link: CVE-2024-10776

cve-icon Redhat

No data.