First published: Tue Nov 01 2022(Updated: )
Password recovery vulnerability in SICK SIM4000 (PPC) Partnumber 1078787 allows an unprivileged remote attacker to gain access to the userlevel defined as RecoverableUserLevel by invocating the password recovery mechanism method. This leads to an increase in their privileges on the system and thereby affecting the confidentiality integrity and availability of the system. An attacker can expect repeatable success by exploiting the vulnerability. The firmware versions <=1.10.1 allow to optionally disable device configuration over the network interfaces. Please make sure that you apply general security practices when operating the SIM4000. A fix is planned but not yet scheduled.
Credit: psirt@sick.de
Affected Software | Affected Version | How to fix |
---|---|---|
<1.2.0 | ||
<1.2.0 | ||
SICK SIM2000ST | ||
Sick Sim2500 Firmware | <1.2.0 | |
Sick Sim2500 | ||
Sick Sim1012 Firmware | <2.2.0 | |
Sick Sim1012 | ||
Sick Sim1004 Firmware | <2.0.0 | |
Sick Sim1004 | ||
Sick Sim1000 Fx Firmware | <1.6.0 | |
SICK SIM1000 FX | ||
Sick Sim4000 Firmware | ||
SICK SIM4000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27582 is a password recovery vulnerability in SICK SIM4000 (PPC) Partnumber 1078787 that allows an unprivileged remote attacker to gain access to the userlevel defined as RecoverableUserLevel.
CVE-2022-27582 has a severity rating of 9.8 (Critical).
CVE-2022-27582 allows an unprivileged remote attacker to gain access to the userlevel defined as RecoverableUserLevel by invoking the password recovery mechanism method.
Versions up to and exclusive of 1.2.0 of SICK SIM2000 firmware, versions up to and exclusive of 1.2.0 of SICK SIM2000ST firmware, versions up to and exclusive of 1.2.0 of Sick Sim2500 Firmware, and versions up to and exclusive of 2.2.0 of Sick Sim1012 Firmware are affected by CVE-2022-27582.
Yes, SICK SIM4000 firmware is affected by CVE-2022-27582.
There is no specific fix available for CVE-2022-27582 at the moment. It is recommended to follow the recommendations provided by the vendor and apply any patches or updates as soon as they become available.