CVE-2024-10773

9.0 CRITICAL

📋 TL;DR

This vulnerability allows attackers to perform pass-the-hash attacks using hardcoded credentials for hidden user levels, granting full device access. It affects SICK industrial automation devices with specific firmware versions. Organizations using these devices in operational technology environments are at risk.

💻 Affected Systems

Products:
  • SICK industrial automation devices (specific models not listed in provided references)
Versions: Specific firmware versions not detailed in provided references
Operating Systems: Embedded/industrial OS on SICK devices
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configurations with hidden user levels enabled. Exact product list requires checking vendor advisory.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to manipulate industrial processes, steal sensitive data, or disrupt operations in critical infrastructure environments.

🟠

Likely Case

Unauthorized access to device configuration and operational data, potentially leading to production disruption or safety system manipulation.

🟢

If Mitigated

Limited impact if devices are properly segmented, monitored, and have network access controls preventing unauthorized authentication attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Pass-the-hash attacks are well-known techniques requiring network access to authentication services. Hidden user levels with hardcoded credentials make exploitation straightforward once discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://sick.com/psirt

Restart Required: Yes

Instructions:

1. Check SICK PSIRT for affected products and patches. 2. Download appropriate firmware updates. 3. Apply updates following vendor procedures. 4. Verify patch application and restart devices as required.

🔧 Temporary Workarounds

Network segmentation

all

Isolate affected devices in separate network segments with strict access controls

Authentication monitoring

all

Implement monitoring for authentication attempts to hidden user accounts

🧯 If You Can't Patch

  • Implement strict network access controls to limit authentication attempts to authorized systems only
  • Deploy intrusion detection systems monitoring for pass-the-hash attack patterns and unusual authentication

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against vendor advisory and test for hidden user level authentication

Check Version:

Device-specific command - consult SICK documentation for firmware version checking

Verify Fix Applied:

Verify firmware version matches patched version from vendor advisory and test that hidden user levels no longer accept authentication

📡 Detection & Monitoring

Log Indicators:

  • Authentication attempts to hidden user accounts
  • Multiple failed authentication attempts followed by success
  • Unusual authentication patterns from unexpected sources

Network Indicators:

  • NTLM/LM authentication traffic patterns consistent with pass-the-hash attacks
  • Authentication requests to industrial device management interfaces

SIEM Query:

source="device_logs" AND (event_type="authentication" AND (user="*hidden*" OR user="*admin*" OR user="*system*"))

🔗 References

📤 Share & Export