CVE-2023-23446

7.5 HIGH

📋 TL;DR

This vulnerability allows unprivileged remote attackers to download files from SICK FTMg AIR FLOW SENSOR devices via the REST interface using low-privilege accounts. It affects specific SICK sensor models with improper access control in their REST API implementation.

💻 Affected Systems

Products:
  • SICK FTMg AIR FLOW SENSOR
Versions: All versions for affected part numbers
Operating Systems: Embedded sensor firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific part numbers: 1100214, 1100215, 1100216, 1120114, 1120116, 1122524, 1122526

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could download sensitive configuration files, firmware, or operational data, potentially leading to device compromise, industrial espionage, or preparation for further attacks.

🟠

Likely Case

Unauthorized file downloads exposing device configurations, network settings, or operational parameters that could be used for reconnaissance or to facilitate other attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing unauthorized REST API access.

🌐 Internet-Facing: HIGH - Devices exposed to internet are directly vulnerable to remote exploitation.
🏢 Internal Only: MEDIUM - Requires internal network access but exploitation is straightforward once access is gained.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires valid low-privilege account credentials but exploitation is simple via REST API calls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific firmware versions

Vendor Advisory: https://sick.com/psirt

Restart Required: Yes

Instructions:

1. Check affected part numbers. 2. Contact SICK support for firmware updates. 3. Apply firmware update following vendor instructions. 4. Restart device.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate sensors in separate network segments with strict firewall rules

Access Control Restrictions

all

Implement strict authentication and authorization controls for REST API access

🧯 If You Can't Patch

  • Segment affected sensors in isolated network zones with no internet access
  • Implement strict firewall rules blocking unauthorized REST API access from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check device part number against affected list and attempt file download via REST API with low-privilege account

Check Version:

Check device web interface or use vendor-specific tools to query firmware version

Verify Fix Applied:

Verify firmware version is updated per vendor advisory and test that file downloads are properly restricted

📡 Detection & Monitoring

Log Indicators:

  • Multiple file download attempts via REST API from low-privilege accounts
  • Unusual file access patterns

Network Indicators:

  • HTTP GET requests to file download endpoints from unauthorized sources
  • REST API traffic to sensor devices

SIEM Query:

source_ip='sensor_network' AND http_method='GET' AND uri CONTAINS '/files/' AND user_privilege='low'

🔗 References

📤 Share & Export