Learn about CVE-2023-23447 impacting SICK FTMG-ESD/ESN/ESR Air Flow Sensors by SICK AG. Update to v3.0.0.131.Release for mitigation.
This CVE-2023-23447 concerns an uncontrolled resource consumption vulnerability found in SICK FTMG-ESD15AXX, FTMG-ESD20AXX, FTMG-ESD25AXX, FTMG-ESN40SXX, FTMG-ESN50SXX, FTMG-ESR40SXX, and FTMG-ESR50SXX Air Flow Sensors manufactured by SICK AG.
Understanding CVE-2023-23447
This vulnerability allows an unprivileged remote attacker to impact the availability of the webserver by invoking multiple open file requests through the REST interface.
What is CVE-2023-23447?
CVE-2023-23447 is classified as CWE-400 Uncontrolled Resource Consumption vulnerability in the SICK FTMG AIR FLOW SENSOR devices with specific part numbers.
The Impact of CVE-2023-23447
The CVSS v3.1 base score for this vulnerability is 7.5, marking it as a high-severity issue. The attack complexity is low, with a network attack vector and high availability impact.
Technical Details of CVE-2023-23447
This section delves into the specifics of the vulnerability, the affected systems and versions, as well as the exploitation mechanism.
Vulnerability Description
The uncontrolled resource consumption vulnerability in the SICK FTMG AIR FLOW SENSOR devices enables an attacker to influence the webserver's availability through the REST interface.
Affected Systems and Versions
The affected products include SICK FTMG-ESD15AXX, FTMG-ESD20AXX, FTMG-ESD25AXX, FTMG-ESN40SXX, FTMG-ESN50SXX, FTMG-ESR40SXX, and FTMG-ESR50SXX Air Flow Sensors with versions less than v3.0.0.131.Release.
Exploitation Mechanism
The vulnerability can be exploited by an unprivileged remote attacker by sending multiple open file requests via the REST interface, leading to uncontrolled resource consumption.
Mitigation and Prevention
In order to address CVE-2023-23447 and enhance system security, specific steps need to be taken to mitigate the risk and prevent potential exploitation.
Immediate Steps to Take
SICK AG has released a new major firmware version v3.0.0.131.Release for SICK FTMG devices. It is strongly recommended to update these devices to the latest version to mitigate the vulnerability.
Long-Term Security Practices
Implementing regular security updates and patches, conducting security assessments, and monitoring network traffic for suspicious activity are essential long-term security practices to prevent similar vulnerabilities in the future.