Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-35698 : Security Advisory and Response

Discover how CVE-2023-35698 enables remote attackers to identify valid FTP server usernames in SICK ICR890-4. Learn about impacts, technical details, and mitigation steps.

A remote attacker could exploit a vulnerability in the SICK ICR890-4 to identify valid usernames for the FTP server. Here's a detailed analysis of CVE-2023-35698.

Understanding CVE-2023-35698

The CVE-2023-35698 vulnerability allows remote attackers to potentially gather sensitive information by exploiting an observable response discrepancy in the SICK ICR890-4 device.

What is CVE-2023-35698?

The vulnerability in SICK ICR890-4 allows attackers to identify valid usernames for the FTP server from the response during failed login attempts. This could lead to unauthorized access to sensitive data.

The Impact of CVE-2023-35698

With a CVSS base score of 5.3 (Medium Severity), this vulnerability poses a moderate risk. An attacker can leverage this flaw to gather user information, compromising the security and confidentiality of data.

Technical Details of CVE-2023-35698

The vulnerability is classified under CWE-204 Observable Response Discrepancy. It has a CVSSv3.1 base score of 5.3 with attack complexity rated as LOW and attack vector as NETWORK.

Vulnerability Description

The flaw in SICK ICR890-4 could allow remote attackers to extract valid usernames for the FTP server during a failed login attempt.

Affected Systems and Versions

The affected product is ICR890-4 by SICK AG with versions less than 2.5.0.

Exploitation Mechanism

Attacks exploiting CVE-2023-35698 are conducted remotely, enabling threat actors to identify valid usernames through response discrepancies.

Mitigation and Prevention

To secure systems against CVE-2023-35698, immediate steps and long-term security practices are crucial.

Immediate Steps to Take

Update the firmware of SICK ICR890-4 to version >= 2.5.0 to mitigate the vulnerability as a priority measure.

Long-Term Security Practices

Regularly monitor for security updates and patches from SICK AG to address potential vulnerabilities and enhance overall system security.

Patching and Updates

Stay informed about the latest security advisories and promptly apply recommended patches and updates provided by SICK AG.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now