Sick

Lms500 Firmware

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.73%
  • Veröffentlicht 24.08.2023 19:15:43
  • Zuletzt bearbeitet 21.11.2024 08:35:06

The LMS5xx uses hard-coded credentials, which potentially allow low-skilled unauthorized remote attackers to reconfigure settings and /or disrupt the functionality of the device.

  • EPSS 0.07%
  • Veröffentlicht 24.08.2023 19:15:43
  • Zuletzt bearbeitet 21.11.2024 08:35:06

A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK LMS5xx. This lack of encryption in the communication channel can lead to the unauthorized disc...

  • EPSS 0.11%
  • Veröffentlicht 24.08.2023 19:15:42
  • Zuletzt bearbeitet 21.11.2024 08:35:06

A remote unprivileged attacker can sent multiple packages to the LMS5xx to disrupt its availability through a TCP SYN-based denial-of-service (DDoS) attack. By exploiting this vulnerability, an attacker can flood the targeted LMS5xx with a high volu...

  • EPSS 0.09%
  • Veröffentlicht 24.08.2023 19:15:33
  • Zuletzt bearbeitet 21.11.2024 08:01:48

The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password.

  • EPSS 0.22%
  • Veröffentlicht 31.08.2020 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:24:33

Platform mechanism AutoIP allows remote attackers to reboot the device via a crafted packet in SICK AG solutions Bulkscan LMS111, Bulkscan LMS511, CLV62x – CLV65x, ICR890-3, LMS10x, LMS11x, LMS15x, LMS12x, LMS13x, LMS14x, LMS5xx, LMS53x, MSC800, RFH.