Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-1788 | The vulnerability may allow a remote low priviledged attacker to run arbitrary shell commands by using lower-level functions to interact with the device. |
Solution
Users are strongly recommended to upgrade to the latest release of the Lector8xx (>=2.4.0) and the InspectorP8xx (>=3.11.1) respectively that includes a patch for the vulnerability. It is also recommended to set a secure password, please refer to the respective operating instructions, linked in the reference section.
Workaround
No workaround given by the vendor.
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 14 Feb 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 14 Feb 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The vulnerability may allow a remote low priviledged attacker to run arbitrary shell commands by using lower-level functions to interact with the device. | |
| Title | SICK Lector8xx and InspectorP8xx vulnerable for code execution | |
| Weaknesses | CWE-77 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-02-14T21:59:58.197Z
Reserved: 2025-01-20T06:40:50.034Z
Link: CVE-2025-0593
Updated: 2025-02-14T21:40:07.944Z
Status : Received
Published: 2025-02-14T21:15:16.680
Modified: 2025-02-14T21:15:16.680
Link: CVE-2025-0593
No data.
OpenCVE Enrichment
No data.
EUVD