{"id": "CVE-2023-23444", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.2, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 4.2, "exploitabilityScore": 3.9}, {"type": "Secondary", "source": "psirt@sick.de", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2023-05-12T13:15:09.350", "references": [{"url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0003.json", "tags": ["Vendor Advisory"], "source": "psirt@sick.de"}, {"url": "https://sick.com/.well-known/csaf/white/2023/sca-2023-0003.pdf", "tags": ["Vendor Advisory"], "source": "psirt@sick.de"}, {"url": "https://sick.com/psirt", "tags": ["Vendor Advisory"], "source": "psirt@sick.de"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-306"}]}], "descriptions": [{"lang": "en", "value": "Missing Authentication for Critical Function in SICK Flexi Classic and Flexi Soft Gateways with Partnumbers 1042193, 1042964, 1044078, 1044072, 1044073, 1044074, 1099830, 1099832, 1127717, 1069070, 1112296, 1051432, 1102420, 1127487, 1121596, 1121597 allows an unauthenticated remote attacker to influence the availability of the device by changing the IP settings of the device via broadcasted UDP packets."}], "lastModified": "2023-05-26T18:15:18.340", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:ue410-en4_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E3BEC1A-8FFB-47E6-A874-783A02593844"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:ue410-en4:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "593FA8EA-007A-47C0-9F22-89E420BBE0D4"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:ue410-en3_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCC9ADCE-3CEE-4FFD-894A-B8F9073C58CB"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:ue410-en3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4F4C5D33-6A97-4509-8151-65D79F03F18A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:ue410-en1_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "598DD1E1-DF04-4C3D-9628-B57C653F4FAD"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:ue410-en1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A963DB6B-C9A9-4B1D-A239-C7B608F2CBD1"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:fx0-gpnt00030:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4CABEFF4-C0A4-4054-8174-7B3762BC0C3F"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:fx0-gpnt00030_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9447F86A-5967-4C97-AF69-369EF2BD2052"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:fx0-gpnt00010:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "60B6F37A-78EE-4D1F-ACAE-FDE864F847B8"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:fx0-gpnt00010_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00770E9A-64BC-4440-A921-49ECD5C5986D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:fx0-gpnt00000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BF3BF752-4F49-4E90-9790-1913ED64D8B3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:fx0-gpnt00000_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30BF991A-B66F-48B3-8902-D50C3B38A30D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:fx0-gmod00010:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "97742720-A8E3-49FE-BE43-EFF720F3D52D"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:fx0-gmod00010_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "925AD219-B3D3-42B6-99E6-E97298AE0A4C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:fx0-gmod00000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D96296E7-65D3-4C0A-8126-4AA8BEF85B39"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:fx0-gmod00000_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E87CA0E-7749-4F1E-B30B-78183ACF3170"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:fx0-gent00030:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1809BCF9-541E-4348-87A3-4CB37D680704"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:fx0-gent00030_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "896EDB87-DB8E-4D82-83EB-65403F23FEB7"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:fx0-gent00010:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BBAC00EB-BB15-4A65-A58D-B3015F7CFF85"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:fx0-gent00010_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61689FA0-FB90-4E9F-B500-AADCF8D827BE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:fx0-gent00000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EAB590A4-F5E4-4A17-B5A6-33A995C96BAB"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:fx0-gent00000_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E8B658A-49DD-4F7C-9A20-191C8F6F3D8F"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "psirt@sick.de"}