An attacker can perform a privilege escalation through the SICK OEE if the application is installed in a directory where non authenticated or low privilege users can modify its content.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://sick.com/psirt |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2024-08-03T05:32:59.859Z
Reserved: 2022-03-21T00:00:00
Link: CVE-2022-27578

No data.

Status : Modified
Published: 2022-04-11T20:15:22.077
Modified: 2024-11-21T06:55:58.970
Link: CVE-2022-27578

No data.