The standard user uses the run as function to start the MEAC applications with administrative privileges. To ensure that the system can startup on its own, the credentials of the administrator were stored. Consequently, the EPC2 user can execute any command with administrative privileges. This allows a privilege escalation to the administrative level.
Metrics
Affected Vendors & Products
References
History
Fri, 21 Feb 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Privilege Escalation in MEAC300-FNADE4 | Privilege Escalation in MEAC300 |
Fri, 14 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 14 Feb 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The standard user uses the run as function to start the MEAC applications with administrative privileges. To ensure that the system can startup on its own, the credentials of the administrator were stored. Consequently, the EPC2 user can execute any command with administrative privileges. This allows a privilege escalation to the administrative level. | |
Title | Privilege Escalation in MEAC300-FNADE4 | |
Weaknesses | CWE-522 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-02-21T14:16:05.951Z
Reserved: 2025-01-30T08:11:55.266Z
Link: CVE-2025-0867

Updated: 2025-02-14T16:23:14.560Z

Status : Received
Published: 2025-02-14T13:15:42.620
Modified: 2025-02-14T13:15:42.620
Link: CVE-2025-0867

No data.