Описание
The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device.
The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-27595
- https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF
- https://github.security.telekom.com/2025/03/multiple-vulnerabilities-in-sick-dl100.html
- https://sick.com/psirt
- https://www.cisa.gov/resources-tools/resources/ics-recommended-practices
- https://www.first.org/cvss/calculator/3.1
- https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.json
- https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.pdf
Связанные уязвимости
The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device.
Уязвимость лазерного датчика SICK DL100, связанная с использованием обратимой односторонней хэш-функции, позволяющая нарушителю оказать влияние на целостность устройства