Metrics
Affected Vendors & Products
Solution
Users are strongly recommended to upgrade to the latest release of the Lector8xx (>=2.4.0) and the InspectorP8xx (>=3.11.1) respectively that includes a patch for the vulnerability. It is also recommended to set a secure password, please refer to the respective operating instructions, linked in the reference section.
Workaround
No workaround given by the vendor.
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Sun, 13 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 14 Feb 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 14 Feb 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The vulnerability may allow a remote low priviledged attacker to run arbitrary shell commands by manipulating the firmware file and uploading it to the device. | |
Title | SICK Lector8xx and InspectorP8xx vulnerable for code execution | |
Weaknesses | CWE-924 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-02-14T22:01:00.488Z
Reserved: 2025-01-20T06:40:46.494Z
Link: CVE-2025-0592

Updated: 2025-02-14T22:00:56.732Z

Status : Received
Published: 2025-02-14T21:15:16.543
Modified: 2025-02-14T21:15:16.543
Link: CVE-2025-0592

No data.

No data.