Vulnerability Details : CVE-2022-27580
A deserialization vulnerability in a .NET framework class used and not properly checked by Safety Designer all versions up to and including 1.11.0 allows an attacker to craft malicious project files. Opening/importing such a malicious project file would execute arbitrary code with the privileges of the current user when opened or imported by the Safety Designer. This compromises confidentiality integrity and availability. For the attack to succeed a user must manually open a malicious project file.
Vulnerability category: Execute code
Products affected by CVE-2022-27580
- cpe:2.3:a:sick:safety_designer:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-27580
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 32 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-27580
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2022-27580
-
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.Assigned by:
- nvd@nist.gov (Primary)
- psirt@sick.de (Secondary)
References for CVE-2022-27580
-
https://sick.com/psirt
The SICK Product Security Incident Response Team (SICK PSIRT) | SICKMitigation;Vendor Advisory
Jump to