A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK EventCam App. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the EventCam App and the Client, and potentially manipulate the data being transmitted.
Workaround:
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
Link | Tags |
---|---|
https://sick.com/psirt | vendor advisory issue tracking |
https://sick.com/.well-known/csaf/white/2023/sca-2023-0005.pdf | vendor advisory |
https://sick.com/.well-known/csaf/white/2023/sca-2023-0005.json | vendor advisory |