CVE-2023-43696

8.2 HIGH

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to download and upload arbitrary files via anonymous FTP access to SICK APU devices. It affects SICK APU products with vulnerable configurations, potentially exposing sensitive data or allowing system compromise.

💻 Affected Systems

Products:
  • SICK APU (Application Programming Unit)
Versions: Specific versions not detailed in CVE; check vendor advisory for exact ranges
Operating Systems: Embedded/Proprietary OS on SICK APU devices
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with FTP service enabled and accessible are vulnerable; default configurations may expose this service.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through malicious file upload leading to remote code execution, data exfiltration, or device takeover.

🟠

Likely Case

Unauthorized access to sensitive configuration files, firmware, or logs; potential for data theft or system manipulation.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external FTP access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only FTP client access; no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://sick.com/psirt

Restart Required: Yes

Instructions:

1. Access vendor advisory at sick.com/psirt. 2. Identify applicable firmware update. 3. Download and apply patch per vendor instructions. 4. Restart device as required.

🔧 Temporary Workarounds

Disable FTP Service

all

Turn off FTP server functionality if not required for operations.

Device-specific; consult SICK APU configuration guide

Restrict Network Access

linux/windows

Block FTP port (typically 21) at network perimeter or firewall.

iptables -A INPUT -p tcp --dport 21 -j DROP
netsh advfirewall firewall add rule name="Block FTP" dir=in action=block protocol=TCP localport=21

🧯 If You Can't Patch

  • Isolate affected devices in segmented network with strict access controls.
  • Implement network monitoring for FTP traffic to/from APU devices.

🔍 How to Verify

Check if Vulnerable:

Attempt anonymous FTP connection to device on port 21; if successful without credentials, device is likely vulnerable.

Check Version:

Device-specific; typically via web interface or serial console command (e.g., 'show version' or similar).

Verify Fix Applied:

After patching, attempt anonymous FTP connection; it should fail or require authentication.

📡 Detection & Monitoring

Log Indicators:

  • Anonymous FTP login attempts in device logs
  • Unexpected file transfers via FTP

Network Indicators:

  • FTP traffic to/from APU devices from untrusted sources
  • Port 21 scans targeting APU IPs

SIEM Query:

source_ip="APU_IP" AND dest_port=21 AND protocol=FTP

🔗 References

📤 Share & Export