The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password.
References
Link | Resource |
---|---|
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json | Vendor Advisory |
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf | Vendor Advisory |
https://sick.com/psirt | Vendor Advisory |
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.json | Vendor Advisory |
https://sick.com/.well-known/csaf/white/2023/sca-2023-0007.pdf | Vendor Advisory |
https://sick.com/psirt | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 08:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-24 19:15
Updated : 2024-11-21 08:01
NVD link : CVE-2023-31412
Mitre link : CVE-2023-31412
CVE.ORG link : CVE-2023-31412
JSON object : View
Products Affected
sick
- lms511
- lms531
- lms500_firmware
- lms531_firmware
- lms511_firmware
- lms500
CWE
CWE-916
Use of Password Hash With Insufficient Computational Effort