CVE-2022-27577
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The vulnerability in the MSC800 in all versions before 4.15 allows for an attacker to predict the TCP initial sequence number. When the TCP sequence is predictable, an attacker can send packets that are forged to appear to come from a trusted computer. These forged packets could compromise services on the MSC800. SICK has released a new firmware version of the SICK MSC800 and recommends updating to the newest version.
Una vulnerabilidad en el MSC800 en todas las versiones anteriores a 4.15 permite a un atacante predecir el número de secuencia inicial TCP. Cuando la secuencia TCP es predecible, un atacante puede enviar paquetes falsificados para que parezcan proceder de un ordenador confiable. Estos paquetes falsificados podrían comprometer los servicios del MSC800. SICK ha publicado una nueva versión de firmware del SICK MSC800 y recomienda actualizar a la versión más reciente
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-03-21 CVE Reserved
- 2022-04-11 CVE Published
- 2024-08-03 CVE Updated
- 2024-12-25 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-330: Use of Insufficiently Random Values
- CWE-342: Predictable Exact Value from Previous Values
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sick Search vendor "Sick" | Msc800 Firmware Search vendor "Sick" for product "Msc800 Firmware" | < 4.15 Search vendor "Sick" for product "Msc800 Firmware" and version " < 4.15" | - |
Affected
| in | Sick Search vendor "Sick" | Msc800 Search vendor "Sick" for product "Msc800" | - | - |
Safe
|