Show filters
80 Total Results
Displaying 61-70 of 80
Sort by:
Attacker Value
Unknown

CVE-2022-27583

Disclosure Date: October 31, 2022 (last updated December 22, 2024)
A remote unprivileged attacker can interact with the configuration interface of a Flexi-Compact FLX3-CPUC1 or FLX3-CPUC2 running an affected firmware version to potentially impact the availability of the FlexiCompact.
Attacker Value
Unknown

CVE-2022-27580

Disclosure Date: July 19, 2022 (last updated February 24, 2025)
A deserialization vulnerability in a .NET framework class used and not properly checked by Safety Designer all versions up to and including 1.11.0 allows an attacker to craft malicious project files. Opening/importing such a malicious project file would execute arbitrary code with the privileges of the current user when opened or imported by the Safety Designer. This compromises confidentiality integrity and availability. For the attack to succeed a user must manually open a malicious project file.
Attacker Value
Unknown

CVE-2022-27579

Disclosure Date: July 19, 2022 (last updated February 24, 2025)
A deserialization vulnerability in a .NET framework class used and not properly checked by Flexi Soft Designer in all versions up to and including 1.9.4 SP1 allows an attacker to craft malicious project files. Opening/importing such a malicious project file would execute arbitrary code with the privileges of the current user when opened or imported by the Flexi Soft Designer. This compromises confidentiality integrity and availability. For the attack to succeed a user must manually open a malicious project file.
Attacker Value
Unknown

CVE-2021-32504

Disclosure Date: July 19, 2022 (last updated February 24, 2025)
Unauthenticated users can access sensitive web URLs through GET request, which should be restricted to maintenance users only. A malicious attacker could use this sensitive information’s to launch further attacks on the system.
Attacker Value
Unknown

CVE-2022-27578

Disclosure Date: April 11, 2022 (last updated February 23, 2025)
An attacker can perform a privilege escalation through the SICK OEE if the application is installed in a directory where non authenticated or low privilege users can modify its content.
Attacker Value
Unknown

CVE-2022-27577

Disclosure Date: April 11, 2022 (last updated February 23, 2025)
The vulnerability in the MSC800 in all versions before 4.15 allows for an attacker to predict the TCP initial sequence number. When the TCP sequence is predictable, an attacker can send packets that are forged to appear to come from a trusted computer. These forged packets could compromise services on the MSC800. SICK has released a new firmware version of the SICK MSC800 and recommends updating to the newest version.
Attacker Value
Unknown

CVE-2021-32503

Disclosure Date: April 01, 2022 (last updated February 23, 2025)
Unauthenticated users can access sensitive web URLs through GET request, which should be restricted to maintenance users only. A malicious attacker could use this sensitive information’s to launch further attacks on the system.
Attacker Value
Unknown

CVE-2021-32499

Disclosure Date: December 17, 2021 (last updated February 23, 2025)
SICK SOPAS ET before version 4.8.0 allows attackers to manipulate the command line arguments to pass in any value to the Emulator executable.
Attacker Value
Unknown

CVE-2021-32498

Disclosure Date: December 17, 2021 (last updated February 23, 2025)
SICK SOPAS ET before version 4.8.0 allows attackers to manipulate the pathname of the emulator and use path traversal to run an arbitrary executable located on the host system. When the user starts the emulator from SOPAS ET the corresponding executable will be started instead of the emulator
Attacker Value
Unknown

CVE-2021-32497

Disclosure Date: December 17, 2021 (last updated October 07, 2023)
SICK SOPAS ET before version 4.8.0 allows attackers to wrap any executable file into an SDD and provide this to a SOPAS ET user. When a user starts the emulator the executable is run without further checks.