First published: Thu Aug 24 2023(Updated: )
A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK LMS5xx. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the LMS5xx and the Client, and potentially manipulate the data being transmitted.
Credit: psirt@sick.de psirt@sick.de
Affected Software | Affected Version | How to fix |
---|---|---|
Sick Lms531 Firmware | ||
Sick Lms531 | ||
Sick Lms511 Firmware | ||
Sick Lms511 | ||
Sick Lms500 Firmware | ||
Sick Lms500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-4420.
CVE-2023-4420 has a severity level of 7.4, which is considered critical.
CVE-2023-4420 affects Sick Lms531 Firmware by enabling a remote unprivileged attacker to intercept communication due to the lack of Transport Layer Security (TLS), potentially leading to unauthorized disclosure of sensitive information.
No, Sick Lms511 is not affected by CVE-2023-4420.
To fix the vulnerability in Sick Lms500 Firmware, it is recommended to implement Transport Layer Security (TLS) in the communication channel to encrypt the data and prevent unauthorized interception.