Due to missing input validation during one step of the firmware update process, the product
is vulnerable to remote code execution. With network access and the user level ”Service”, an attacker
can execute arbitrary system commands in the root user’s contexts.
Metrics
Affected Vendors & Products
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 09 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sick
Sick inspector61x Firmware Sick inspector62x Firmware Sick tim3xx |
|
| CPEs | cpe:2.3:a:sick:tim3xx:*:*:*:*:*:*:*:* cpe:2.3:o:sick:inspector61x_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:sick:inspector62x_firmware:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Sick
Sick inspector61x Firmware Sick inspector62x Firmware Sick tim3xx |
|
| Metrics |
ssvc
|
Fri, 06 Dec 2024 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Due to missing input validation during one step of the firmware update process, the product is vulnerable to remote code execution. With network access and the user level ”Service”, an attacker can execute arbitrary system commands in the root user’s contexts. | |
| Title | SICK InspectorP61x, SICK InspectorP62x and SICK TiM3xx are vulnerable for remote code execution | |
| Weaknesses | CWE-94 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SICK AG
Published: 2024-12-06T12:24:40.610Z
Updated: 2024-12-09T14:47:30.064Z
Reserved: 2024-11-04T13:06:55.136Z
Link: CVE-2024-10771
Updated: 2024-12-09T14:47:22.147Z
Status : Received
Published: 2024-12-06T13:15:04.797
Modified: 2024-12-06T13:15:04.797
Link: CVE-2024-10771
No data.