Description
SICK SOPAS ET before version 4.8.0 allows attackers to wrap any executable file into an SDD and provide this to a SOPAS ET user. When a user starts the emulator the executable is run without further checks.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-19343 | SICK SOPAS ET before version 4.8.0 allows attackers to wrap any executable file into an SDD and provide this to a SOPAS ET user. When a user starts the emulator the executable is run without further checks. |
References
| Link | Providers |
|---|---|
| https://sick.com/psirt#advisories |
|
History
No history.
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2024-08-03T23:17:29.571Z
Reserved: 2021-05-10T00:00:00.000Z
Link: CVE-2021-32497
No data.
Status : Modified
Published: 2021-12-17T17:15:12.647
Modified: 2024-11-21T06:07:09.167
Link: CVE-2021-32497
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD