First published: Mon May 15 2023(Updated: )
Use of Password Hash Instead of Password for Authentication in SICK FTMg AIR FLOW SENSOR with Partnumbers 1100214, 1100215, 1100216, 1120114, 1120116, 1122524, 1122526 allows an unprivileged remote attacker to use a password hash instead of an actual password to login to a valid user account via the REST interface.
Credit: psirt@sick.de
Affected Software | Affected Version | How to fix |
---|---|---|
Sick Ftmg-esd20axx Firmware | <2.0 | |
Sick Ftmg-esd20axx | ||
Sick Ftmg-esd25axx Firmware | <2.0 | |
Sick Ftmg-esd25axx | ||
Sick Ftmg-esn40sxx Firmware | <2.0 | |
Sick Ftmg-esn40sxx | ||
Sick Ftmg-esn50sxx Firmware | <2.0 | |
Sick Ftmg-esn50sxx | ||
Sick Ftmg-esr50sxx Firmware | <2.0 | |
Sick Ftmg-esr50sxx | ||
Sick Ftmg-esr40sxx Firmware | <2.0 | |
Sick Ftmg-esr40sxx | ||
Sick Ftmg-esd15axx Firmware | <2.0 | |
Sick Ftmg-esd15axx |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-23450 is critical with a score of 9.8.
CVE-2023-23450 allows an unprivileged remote attacker to login to a valid user account using a password hash instead of an actual password.
SICK FTMg AIR FLOW SENSOR firmware versions up to but excluding 2.0 are affected by CVE-2023-23450.
To fix CVE-2023-23450, users should update to a version of SICK FTMg AIR FLOW SENSOR firmware that is higher than 2.0.
More information about CVE-2023-23450 can be found at the following references: [Link 1](https://sick.com/.well-known/csaf/white/2023/sca-2023-0004.json), [Link 2](https://sick.com/.well-known/csaf/white/2023/sca-2023-0004.pdf), [Link 3](https://sick.com/psirt).