The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password.
History

Mon, 09 Dec 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Sick lms5xx
CPEs cpe:2.3:h:sick_ag:lms5xx:*:*:*:*:*:*:*:* cpe:2.3:h:sick:lms5xx:*:*:*:*:*:*:*:*
Vendors & Products Sick Ag
Sick Ag lms5xx
Sick lms5xx

Thu, 03 Oct 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Sick Ag
Sick Ag lms5xx
CPEs cpe:2.3:h:sick_ag:lms5xx:*:*:*:*:*:*:*:*
Vendors & Products Sick Ag
Sick Ag lms5xx
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published: 2023-08-24T18:15:53.835Z

Updated: 2024-12-09T14:12:04.011Z

Reserved: 2023-04-27T18:35:47.418Z

Link: CVE-2023-31412

cve-icon Vulnrichment

Updated: 2024-08-02T14:53:30.758Z

cve-icon NVD

Status : Modified

Published: 2023-08-24T19:15:33.977

Modified: 2024-11-21T08:01:48.617

Link: CVE-2023-31412

cve-icon Redhat

No data.