Vulnerability Details : CVE-2023-31412
The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password.
Products affected by CVE-2023-31412
- cpe:2.3:o:sick:lms511_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:sick:lms531_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:sick:lms500_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-31412
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 48 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-31412
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
SICK AG |
CWE ids for CVE-2023-31412
-
The product generates a hash for a password, but it uses a scheme that does not provide a sufficient level of computational effort that would make password cracking attacks infeasible or expensive.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-31412
-
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf
Vendor Advisory
-
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json
Vendor Advisory
-
https://sick.com/psirt
The SICK Product Security Incident Response Team (SICK PSIRT) | SICKVendor Advisory
Jump to