sca-2025-0005
Vulnerability from csaf_sick
Published
2025-04-28 10:00
Modified
2025-04-28 10:00
Summary
Vulnerabilities in SICK Flexi Compact
Notes
summary
SICK has found two vulnerabilities that affect the SICK Flexi Compact.
The vulnerabilities may affect the availability and confidentiality of the products.
SICK is currently not aware of any public exploits.
General Security Measures
As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.
Vulnerability Classification
SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer’s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en-US", "notes": [ { "category": "summary", "text": "SICK has found two vulnerabilities that affect the SICK Flexi Compact.\nThe vulnerabilities may affect the availability and confidentiality of the products.\nSICK is currently not aware of any public exploits. \n", "title": "summary" }, { "category": "general", "text": "As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.", "title": "General Security Measures" }, { "category": "general", "text": "SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer\u2019s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.", "title": "Vulnerability Classification" } ], "publisher": { "category": "vendor", "contact_details": "psirt@sick.de", "issuing_authority": "SICK PSIRT is responsible for any vulnerabilities related to SICK products.", "name": "SICK PSIRT", "namespace": "https://www.sick.com/psirt" }, "references": [ { "summary": "SICK PSIRT Security Advisories", "url": "https://sick.com/psirt" }, { "summary": "SICK Operating Guidelines", "url": "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF" }, { "summary": "ICS-CERT recommended practices on Industrial Security", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "summary": "CVSS v3.1 Calculator", "url": "https://www.first.org/cvss/calculator/3.1" }, { "category": "self", "summary": "The canonical URL.", "url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0005.json" } ], "title": "Vulnerabilities in SICK Flexi Compact", "tracking": { "current_release_date": "2025-04-28T10:00:00.000Z", "generator": { "date": "2025-04-28T06:24:37.901Z", "engine": { "name": "Secvisogram", "version": "2.5.24" } }, "id": "SCA-2025-0005", "initial_release_date": "2025-04-28T10:00:00.000Z", "revision_history": [ { "date": "2025-04-28T10:00:00.000Z", "number": "1", "summary": "Initial version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SICK FLX3-CPUC200 all versions", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "FLX3-CPUC200" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SICK FLX0-GPNT100 all versions", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "FLX0-GPNT100" } ], "category": "product_family", "name": "Flexi Compact" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SICK FLX3-CPUC200 all Firmware versions", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "FLX3-CPUC200 Firmware" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SICK FLX0-GPNT100 all Firmware versions", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "FLX0-GPNT100 Firmware" } ], "category": "vendor", "name": "SICK AG" } ], "relationships": [ { "category": "installed_on", "full_product_name": { "name": "SICK FLX3-CPUC200 all firmware versions", "product_id": "CSAFPID-0008" }, "product_reference": "CSAFPID-0005", "relates_to_product_reference": "CSAFPID-0001" }, { "category": "installed_on", "full_product_name": { "name": "SICK FLX0-GPNT100 all firmware versions", "product_id": "CSAFPID-0010" }, "product_reference": "CSAFPID-0006", "relates_to_product_reference": "CSAFPID-0002" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-32470", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "audience": "all", "category": "summary", "text": "A remote unauthenticated attacker may be able to change the IP adress of the device, and therefore affecting the availability of the device.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0008", "CSAFPID-0010" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0010", "CSAFPID-0008" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0010", "CSAFPID-0008" ] } ], "title": "DoS by unauthenticated change of IP address" }, { "cve": "CVE-2025-32471", "cwe": { "id": "CWE-1391", "name": "Use of Weak Credentials" }, "notes": [ { "audience": "all", "category": "summary", "text": "The device\u0027s passwords have not been adequately salted, making them vulnerable to password extraction attacks.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0008" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "environmentalScore": 3.7, "environmentalSeverity": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 3.7, "temporalSeverity": "LOW", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0008" ] } ], "title": "Password hashed with standard salt " } ] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.