The standard user uses the run as function to start the MEAC applications with administrative privileges. To ensure that the system can startup on its own, the credentials of the administrator were stored. Consequently, the EPC2 user can execute any command with administrative privileges. This allows a privilege escalation to the administrative level.
History

Fri, 21 Feb 2025 10:15:00 +0000

Type Values Removed Values Added
Title Privilege Escalation in MEAC300-FNADE4 Privilege Escalation in MEAC300

Fri, 14 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 14 Feb 2025 13:00:00 +0000

Type Values Removed Values Added
Description The standard user uses the run as function to start the MEAC applications with administrative privileges. To ensure that the system can startup on its own, the credentials of the administrator were stored. Consequently, the EPC2 user can execute any command with administrative privileges. This allows a privilege escalation to the administrative level.
Title Privilege Escalation in MEAC300-FNADE4
Weaknesses CWE-522
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2025-02-21T14:16:05.951Z

Reserved: 2025-01-30T08:11:55.266Z

Link: CVE-2025-0867

cve-icon Vulnrichment

Updated: 2025-02-14T16:23:14.560Z

cve-icon NVD

Status : Received

Published: 2025-02-14T13:15:42.620

Modified: 2025-02-14T13:15:42.620

Link: CVE-2025-0867

cve-icon Redhat

No data.