The vulnerability may allow a remote low priviledged attacker to run arbitrary shell commands by manipulating the firmware file and uploading it to the device.
Fixes

Solution

Users are strongly recommended to upgrade to the latest release of the Lector8xx (>=2.4.0) and the InspectorP8xx (>=3.11.1) respectively that includes a patch for the vulnerability. It is also recommended to set a secure password, please refer to the respective operating instructions, linked in the reference section.


Workaround

No workaround given by the vendor.

History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00056}

epss

{'score': 0.00063}


Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00078}

epss

{'score': 0.00056}


Fri, 14 Feb 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 14 Feb 2025 20:30:00 +0000

Type Values Removed Values Added
Description The vulnerability may allow a remote low priviledged attacker to run arbitrary shell commands by manipulating the firmware file and uploading it to the device.
Title SICK Lector8xx and InspectorP8xx vulnerable for code execution
Weaknesses CWE-924
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2025-02-14T22:01:00.488Z

Reserved: 2025-01-20T06:40:46.494Z

Link: CVE-2025-0592

cve-icon Vulnrichment

Updated: 2025-02-14T22:00:56.732Z

cve-icon NVD

Status : Received

Published: 2025-02-14T21:15:16.543

Modified: 2025-02-14T21:15:16.543

Link: CVE-2025-0592

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.