Filtered by vendor Sick Ag Subscriptions
Total 7 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-3273 2 Sick, Sick Ag 3 Icr890-4, Icr890-4 Firmware, Icr890-4 2024-11-21 7.5 High
Improper Access Control in the SICK ICR890-4 could allow an unauthenticated remote attacker to affect the availability of the device by changing settings of the device such as the IP address based on missing access control.
CVE-2023-3272 2 Sick, Sick Ag 3 Icr890-4, Icr890-4 Firmware, Icr890-4 2024-11-21 7.5 High
Cleartext Transmission of Sensitive Information in the SICK ICR890-4 could allow a remote attacker to gather sensitive information by intercepting network traffic that is not encrypted.
CVE-2023-3271 2 Sick, Sick Ag 3 Icr890-4, Icr890-4 Firmware, Icr890-4 2024-11-21 8.2 High
Improper Access Control in the SICK ICR890-4 could allow an unauthenticated remote attacker to gather information about the system and download data via the REST API by accessing unauthenticated endpoints.
CVE-2023-3270 2 Sick, Sick Ag 3 Icr890-4, Icr890-4 Firmware, Icr890-4 2024-11-21 8.6 High
Exposure of Sensitive Information to an Unauthorized Actor in the SICK ICR890-4 could allow an unauthenticated remote attacker to retrieve sensitive information about the system.
CVE-2023-35697 2 Sick, Sick Ag 3 Icr890-4, Icr890-4 Firmware, Icr890-4 2024-11-21 5.3 Medium
Improper Restriction of Excessive Authentication Attempts in the SICK ICR890-4 could allow a remote attacker to brute-force user credentials.
CVE-2023-35696 2 Sick, Sick Ag 3 Icr890-4, Icr890-4 Firmware, Icr890-4 2024-11-21 7.5 High
Unauthenticated endpoints in the SICK ICR890-4 could allow an unauthenticated remote attacker to retrieve sensitive information about the device via HTTP requests.
CVE-2024-11075 1 Sick Ag 1 Incoming Goods Suite 2024-11-20 8.8 High
A vulnerability in the Incoming Goods Suite allows a user with unprivileged access to the underlying system (e.g. local or via SSH) a privilege escalation to the administrative level due to the usage of component vendor Docker images running with root permissions. Exploiting this misconfiguration leads to the fact that an attacker can gain administrative control. over the whole system.