A vulnerability in the MSC800 allows an unauthenticated attacker to modify the product’s IP address over Sopas ET. This can lead to Denial of Service. Users are recommended to upgrade both MSC800 and MSC800 LFT to version V4.26 and S2.93.20 respectively which fixes this issue.
History

Fri, 13 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Sick
Sick msc800 Firmware
CPEs cpe:2.3:o:sick:msc800_firmware:*:*:*:*:*:*:*:*
Vendors & Products Sick
Sick msc800 Firmware
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Sep 2024 22:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in the MSC800 allows an unauthenticated attacker to modify the product’s IP address over Sopas ET. This can lead to Denial of Service. Users are recommended to upgrade both MSC800 and MSC800 LFT to version V4.26 and S2.93.20 respectively which fixes this issue.
Title Vulnerability in SICK MSC800
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published: 2024-09-12T21:38:37.516Z

Updated: 2024-09-13T14:02:19.375Z

Reserved: 2024-09-12T13:17:03.176Z

Link: CVE-2024-8751

cve-icon Vulnrichment

Updated: 2024-09-13T14:00:20.584Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-12T22:15:02.680

Modified: 2024-09-13T14:06:04.777

Link: CVE-2024-8751

cve-icon Redhat

No data.