Lua apps can be deployed, removed, started, reloaded or stopped without authorization via
AppManager. This allows an attacker to remove legitimate apps creating a DoS attack, read and write
files or load apps that use all features of the product available to a customer.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Dec 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Sick
Sick inspector61x Firmware Sick inspector62x Firmware |
|
CPEs | cpe:2.3:o:sick:inspector61x_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:sick:inspector62x_firmware:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Lua
Lua lua |
Sick
Sick inspector61x Firmware Sick inspector62x Firmware |
Fri, 06 Dec 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lua
Lua lua |
|
CPEs | cpe:2.3:a:lua:lua:-:*:*:*:*:*:*:* | |
Vendors & Products |
Lua
Lua lua |
|
Metrics |
ssvc
|
Fri, 06 Dec 2024 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Lua apps can be deployed, removed, started, reloaded or stopped without authorization via AppManager. This allows an attacker to remove legitimate apps creating a DoS attack, read and write files or load apps that use all features of the product available to a customer. | |
Title | SICK InspectorP61x and SICK InspectorP62x: missing authentication | |
Weaknesses | CWE-306 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: SICK AG
Published: 2024-12-06T12:38:55.781Z
Updated: 2024-12-09T14:06:40.506Z
Reserved: 2024-11-04T13:08:11.677Z
Link: CVE-2024-10776
Vulnrichment
Updated: 2024-12-06T18:52:22.793Z
NVD
Status : Received
Published: 2024-12-06T13:15:06.147
Modified: 2024-12-06T13:15:06.147
Link: CVE-2024-10776
Redhat
No data.