Description
An attacker can perform a privilege escalation through the SICK OEE if the application is installed in a directory where non authenticated or low privilege users can modify its content.
Published: 2022-04-11
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-32079 An attacker can perform a privilege escalation through the SICK OEE if the application is installed in a directory where non authenticated or low privilege users can modify its content.
References
Link Providers
https://sick.com/psirt cve-icon cve-icon
History

No history.

Subscriptions

Sick Overall Equipment Effectiveness
cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2024-08-03T05:32:59.859Z

Reserved: 2022-03-21T00:00:00.000Z

Link: CVE-2022-27578

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-11T20:15:22.077

Modified: 2024-11-21T06:55:58.970

Link: CVE-2022-27578

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses