Description
Lua apps can be deployed, removed, started, reloaded or stopped without authorization via
AppManager. This allows an attacker to remove legitimate apps creating a DoS attack, read and write
files or load apps that use all features of the product available to a customer.
Published: 2024-12-06
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Workaround

Customers are strongly recommended to upgrade to the latest release. Furthermore, the app development should be done in a trusted environment. After the development, app management should be disabled

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-33533 Lua apps can be deployed, removed, started, reloaded or stopped without authorization via AppManager. This allows an attacker to remove legitimate apps creating a DoS attack, read and write files or load apps that use all features of the product available to a customer.
History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00252}

epss

{'score': 0.00282}


Mon, 09 Dec 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Sick
Sick inspector61x Firmware
Sick inspector62x Firmware
CPEs cpe:2.3:a:lua:lua:-:*:*:*:*:*:*:* cpe:2.3:o:sick:inspector61x_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:sick:inspector62x_firmware:-:*:*:*:*:*:*:*
Vendors & Products Lua
Lua lua
Sick
Sick inspector61x Firmware
Sick inspector62x Firmware

Fri, 06 Dec 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Lua
Lua lua
CPEs cpe:2.3:a:lua:lua:-:*:*:*:*:*:*:*
Vendors & Products Lua
Lua lua
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Dec 2024 13:00:00 +0000

Type Values Removed Values Added
Description Lua apps can be deployed, removed, started, reloaded or stopped without authorization via AppManager. This allows an attacker to remove legitimate apps creating a DoS attack, read and write files or load apps that use all features of the product available to a customer.
Title SICK InspectorP61x and SICK InspectorP62x: missing authentication
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}


Subscriptions

Sick Inspector61x Firmware Inspector62x Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2024-12-09T14:06:40.506Z

Reserved: 2024-11-04T13:08:11.677Z

Link: CVE-2024-10776

cve-icon Vulnrichment

Updated: 2024-12-06T18:52:22.793Z

cve-icon NVD

Status : Deferred

Published: 2024-12-06T13:15:06.147

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-10776

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses