A vulnerability in the MSC800 allows an unauthenticated attacker to modify the product’s IP
address over Sopas ET.
This can lead to Denial of Service.
Users are recommended to upgrade both
MSC800 and MSC800 LFT to version V4.26 and S2.93.20 respectively which fixes this issue.
Metrics
Affected Vendors & Products
References
History
Fri, 13 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Sick
Sick msc800 Firmware |
|
CPEs | cpe:2.3:o:sick:msc800_firmware:*:*:*:*:*:*:*:* | |
Vendors & Products |
Sick
Sick msc800 Firmware |
|
Metrics |
ssvc
|
Thu, 12 Sep 2024 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the MSC800 allows an unauthenticated attacker to modify the product’s IP address over Sopas ET. This can lead to Denial of Service. Users are recommended to upgrade both MSC800 and MSC800 LFT to version V4.26 and S2.93.20 respectively which fixes this issue. | |
Title | Vulnerability in SICK MSC800 | |
Weaknesses | CWE-306 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: SICK AG
Published: 2024-09-12T21:38:37.516Z
Updated: 2024-09-13T14:02:19.375Z
Reserved: 2024-09-12T13:17:03.176Z
Link: CVE-2024-8751
Vulnrichment
Updated: 2024-09-13T14:00:20.584Z
NVD
Status : Awaiting Analysis
Published: 2024-09-12T22:15:02.680
Modified: 2024-09-13T14:06:04.777
Link: CVE-2024-8751
Redhat
No data.