sca-2022-0010
Vulnerability from csaf_sick
Published
2022-05-16 10:00
Modified
2022-07-19 10:00
Summary
Vulnerability in SICK Flexi Soft Designer & Safety Designer
Notes
A deserialization vulnerability in a .NET framework class used by both SICK Flexi Soft Designer and SICK Safety Designer allows an attacker to create malicious project files.
General Security Measures
As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.
Vulnerability Classification
SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer’s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en-US", "notes": [ { "category": "summary", "text": "A deserialization vulnerability in a .NET framework class used by both SICK Flexi Soft Designer and SICK Safety Designer allows an attacker to create malicious project files." }, { "category": "general", "text": "As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.", "title": "General Security Measures" }, { "category": "general", "text": "SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer\u2019s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.", "title": "Vulnerability Classification" } ], "publisher": { "category": "vendor", "contact_details": "psirt@sick.de", "issuing_authority": "SICK PSIRT is responsible for any vulnerabilities related to SICK products.", "name": "SICK PSIRT", "namespace": "https://sick.com/psirt" }, "references": [ { "summary": "SICK PSIRT Security Advisories", "url": "https://sick.com/psirt" }, { "summary": "SICK Operating Guidelines", "url": "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF" }, { "summary": "ICS-CERT recommended practices on Industrial Security", "url": "http://ics-cert.us-cert.gov/content/recommended-practices" }, { "summary": "CVSS v3.1 Calculator", "url": "https://www.first.org/cvss/calculator/3.1" }, { "category": "self", "summary": "The canonical URL.", "url": "https://www.sick.com/.well-known/csaf/white/2022/sca-2022-0010.json" } ], "title": "Vulnerability in SICK Flexi Soft Designer \u0026 Safety Designer", "tracking": { "current_release_date": "2022-07-19T10:00:00.000Z", "generator": { "date": "2023-02-10T09:48:37.898Z", "engine": { "name": "Secvisogram", "version": "2.0.0" } }, "id": "SCA-2022-0010", "initial_release_date": "2022-05-16T10:00:00.000Z", "revision_history": [ { "date": "2022-05-16T10:00:00.000Z", "number": "1", "summary": "Initial Release" }, { "date": "2022-07-19T10:00:00.000Z", "number": "2", "summary": "Assigned CVEs" }, { "date": "2023-02-10T11:00:00.000Z", "number": "3", "summary": "Updated Advisory (only visual changes)" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=1.9.4 SP1", "product": { "name": "SICK Flexi Soft Designer \u003c=1.9.4 SP1", "product_id": "CSAFPID-0001", "product_identification_helper": { "x_generic_uris": [ { "namespace": "SICK:Website", "uri": "SICK:Website:https://www.sick.com/de/de/p/p674217" } ] } } }, { "category": "product_version", "name": "1.9.5", "product": { "name": "SICK Flexi Soft Designer 1.9.5", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Flexi Soft Designer" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=1.11.0", "product": { "name": "SICK Safety Designer \u003c=1.11.0", "product_id": "CSAFPID-0003", "product_identification_helper": { "x_generic_uris": [ { "namespace": "SICK:Website", "uri": "SICK:Website:https://www.sick.com/de/de/p/p674218" } ] } } }, { "category": "product_version", "name": "1.12.0", "product": { "name": "SICK Safety Designer 1.12.0", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "Safety Designer" } ], "category": "vendor", "name": "SICK AG" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-27579", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "description", "text": "A deserialization vulnerability in a .NET framework class used and not properly checked by Flexi Soft Designer in all versions up to and including 1.9.4 SP1 allows an attacker to craft malicious project files. Opening/importing such a malicious project file would execute arbitrary code with the privileges of the current user when opened or imported by the Flexi Soft Designer. This compromises confidentiality integrity and availability.For the attack to succeed a user must manually open a malicious project file." } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "Microsoft Security Guide", "url": "https://docs.microsoft.com/en-us/dotnet/standard/serialization/binaryformatter-security-guide" } ], "remediations": [ { "category": "vendor_fix", "date": "2022-05-16T10:00:00.000Z", "details": "The recommended solution is to update Flexi Soft Designer to the latest version as soon as possible. \n\nIf you cannot update to an unaffected version, please make sure that you:\n\n - Only open/import project files from trusted sources\n\n - Do not run Safety Designer / Flexi Soft Designer under a windows account with elevated privileges", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-27580", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "description", "text": "A deserialization vulnerability in a .NET framework class used and not properly checked by Safety Designer all versions up to and including 1.11.0 allows an attacker to craft malicious project files. Opening/importing such a malicious project file would execute arbitrary code with the privileges of the current user when opened or imported by the Safety Designer. This compromises confidentiality integrity and availability.For the attack to succeed a user must manually open a malicious project file." } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "references": [ { "category": "external", "summary": "Microsoft Security Guide", "url": "https://docs.microsoft.com/en-us/dotnet/standard/serialization/binaryformatter-security-guide" } ], "remediations": [ { "category": "vendor_fix", "date": "2022-05-16T10:00:00.000Z", "details": "The recommended solution is to update Safety Designer to the latest version as soon as possible. Note that projects created with Safety Designer 1.12.0 cannot be loaded in earlier versions.\n\nIf you cannot update to an unaffected version, please make sure that you:\n\n-\tOnly open/import project files from trusted sources\n\n-\tDo not run Safety Designer / Flexi Soft Designer under a windows account with elevated privileges", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ] } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.