sca-2022-0003
Vulnerability from csaf_sick
Published
2022-03-31 15:00
Modified
2022-03-31 15:00
Summary
Vulnerabilities in SICK FTMg
Notes
General Security Measures
As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.
Vulnerability Classification
SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer’s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.
SICK received a report about multiple security vulnerabilities in the SICK FTMg device.
Currently SICK is not aware of any public exploits specifically targeting any of the vulnerabilities.
SICK has released a new version of the SICK FTMg firmware and recommends updating
to the newest version.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.", "title": "General Security Measures" }, { "category": "general", "text": "SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer\u2019s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.", "title": "Vulnerability Classification" }, { "category": "summary", "text": "SICK received a report about multiple security vulnerabilities in the SICK FTMg device.\n\nCurrently SICK is not aware of any public exploits specifically targeting any of the vulnerabilities.\n\nSICK has released a new version of the SICK FTMg firmware and recommends updating\nto the newest version." } ], "publisher": { "category": "vendor", "contact_details": "psirt@sick.de", "issuing_authority": "SICK PSIRT is responsible for any vulnerabilities related to SICK products.", "name": "SICK PSIRT", "namespace": "https://sick.com/psirt" }, "references": [ { "summary": "SICK PSIRT Security Advisories", "url": "https://sick.com/psirt" }, { "summary": "SICK Operating Guidelines", "url": "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF" }, { "summary": "ICS-CERT recommended practices on Industrial Security", "url": "http://ics-cert.us-cert.gov/content/recommended-practices" }, { "summary": "CVSS v3.1 Calculator", "url": "https://www.first.org/cvss/calculator/3.1" }, { "category": "self", "summary": "The canonical URL.", "url": "https://www.sick.com/.well-known/csaf/white/2022/sca-2022-0003.json" } ], "title": "Vulnerabilities in SICK FTMg", "tracking": { "current_release_date": "2022-03-31T15:00:00.000Z", "generator": { "date": "2023-02-10T08:38:52.656Z", "engine": { "name": "Secvisogram", "version": "2.0.0" } }, "id": "SCA-2022-0003", "initial_release_date": "2022-03-31T15:00:00.000Z", "revision_history": [ { "date": "2022-03-31T15:00:00.000Z", "number": "1", "summary": "Initial Release" }, { "date": "2023-02-10T11:00:00.000Z", "number": "2", "summary": "Updated Advisory (only visual changes)" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SICK FTMg all versions", "product_id": "CSAFPID-0001", "product_identification_helper": { "x_generic_uris": [ { "namespace": "SICK:Website", "uri": "SICK:Website:https://www.sick.com/de/de/fluidsensorik/durchflusssensoren/ftmg/c/g505155" } ] } } } ], "category": "product_name", "name": "FTMg" }, { "branches": [ { "category": "product_version_range", "name": "\u003c2.8", "product": { "name": "SICK FTMg Firmware \u003c2.8", "product_id": "CSAFPID-0002" } }, { "category": "product_version", "name": "2.8", "product": { "name": "SICK FTMg Firmware 2.8", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "FTMg Firmware" } ], "category": "vendor", "name": "SICK AG" } ], "relationships": [ { "category": "installed_on", "full_product_name": { "name": "SICK FTMg with Firmware \u003c2.8", "product_id": "CSAFPID-0004" }, "product_reference": "CSAFPID-0002", "relates_to_product_reference": "CSAFPID-0001" }, { "category": "installed_on", "full_product_name": { "name": "SICK FTMg with Firmware 2.8", "product_id": "CSAFPID-0005" }, "product_reference": "CSAFPID-0003", "relates_to_product_reference": "CSAFPID-0001" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-32503", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "It is possible to crash the embedded FTMg web server by suppling too many characters to the \nendpoint parameters. This fills up the buffer which results in a crash of the web server. The sensor still \nmeasures, even if the webserver crashed. To access the endpoint parameters, maintenance level \nprivileges are needed. ", "title": "Summary" } ], "product_status": { "fixed": [ "CSAFPID-0005", "CSAFPID-0003" ], "known_affected": [ "CSAFPID-0004" ] }, "references": [ { "summary": "CVE Entry", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32503" } ], "remediations": [ { "category": "vendor_fix", "date": "2022-03-31T15:00:00.000Z", "details": "SICK has released a new version of the SICK FTMg firmware and recommends updating to the newest version.", "product_ids": [ "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0004" ] } ] }, { "cve": "CVE-2021-32504", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "Unauthenticated users can access sensitive web URLs through GET request, which should be restricted\nto maintenance users only. A malicious attacker could use this sensitive information\u2019s to launch further \nattacks on the system. ", "title": "Summary" } ], "product_status": { "fixed": [ "CSAFPID-0005", "CSAFPID-0003" ], "known_affected": [ "CSAFPID-0004" ] }, "references": [ { "summary": "CVE Entry", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32504" } ], "remediations": [ { "category": "vendor_fix", "date": "2022-03-31T15:00:00.000Z", "details": "SICK has released a new version of the SICK FTMg firmware and recommends updating to the newest version.", "product_ids": [ "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0004" ] } ] } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.