First published: Fri Sep 29 2023(Updated: )
A remote unauthorized attacker may connect to the SIM1012, interact with the device and change configuration settings. The adversary may also reset the SIM and in the worst case upload a new firmware version to the device.
Credit: psirt@sick.de psirt@sick.de
Affected Software | Affected Version | How to fix |
---|---|---|
Sick Sim1012-0p0g200 Firmware | ||
Sick Sim1012-0p0g200 | ||
All of | ||
Sick Sim1012-0p0g200 Firmware | ||
Sick Sim1012-0p0g200 |
SICK recommends to disable port 2111 & 2122 once the SIM1012 is put into operation. The information how to disable the port can be retrieved from the SIM1012 API documentation. SICK recommends using the SICK AppManager in version >=1.5.6 for the commissioning of the SIM1012.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-5288.
The severity of CVE-2023-5288 is critical, with a severity value of 9.8.
The affected software is Sick Sim1012-0p0g200 Firmware.
The potential impact of CVE-2023-5288 is that a remote unauthorized attacker may connect to the SIM1012, interact with the device, change configuration settings, reset the SIM, and in the worst case, upload a new firmware version to the device.
Yes, there are references for CVE-2023-5288. You can find them at the following links: [Reference 1](https://sick.com/.well-known/csaf/white/2023/sca-2023-0008.json), [Reference 2](https://sick.com/.well-known/csaf/white/2023/sca-2023-0008.pdf), [Reference 3](https://sick.com/psirt).