CVE-2024-8751

7.5 HIGH

📋 TL;DR

An unauthenticated attacker can modify the IP address of MSC800 devices via Sopas ET protocol, causing denial of service by making devices unreachable. This affects all MSC800 and MSC800 LFT devices running vulnerable versions. Industrial control systems using these SICK sensors are at risk.

💻 Affected Systems

Products:
  • SICK MSC800
  • SICK MSC800 LFT
Versions: All versions before V4.26 for MSC800 and before S2.93.20 for MSC800 LFT
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default Sopas ET protocol configuration; no special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Critical industrial processes fail due to sensor communication loss, potentially causing safety incidents, production downtime, or equipment damage.

🟠

Likely Case

Targeted devices become unreachable on the network, requiring physical access to restore connectivity and causing operational disruption.

🟢

If Mitigated

Network segmentation prevents exploitation attempts, limiting impact to isolated network segments.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to Sopas ET port (default 2111/2112) but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V4.26 for MSC800, S2.93.20 for MSC800 LFT

Vendor Advisory: https://sick.com/psirt

Restart Required: Yes

Instructions:

1. Download firmware from SICK customer portal. 2. Backup current configuration. 3. Apply firmware update via SOPAS ET or web interface. 4. Restart device. 5. Restore configuration if needed.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate MSC800 devices in separate VLANs with strict firewall rules blocking unauthorized access to Sopas ET ports.

Access Control Lists

all

Implement network ACLs to restrict access to port 2111/2112 only to authorized management stations.

🧯 If You Can't Patch

  • Physically isolate vulnerable devices from untrusted networks
  • Implement strict network monitoring for unauthorized access attempts to port 2111/2112

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via SOPAS ET software or web interface; compare against patched versions.

Check Version:

Use SOPAS ET 'Device Information' function or access web interface status page

Verify Fix Applied:

Confirm firmware version shows V4.26 or higher for MSC800, S2.93.20 or higher for MSC800 LFT.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized connection attempts to port 2111/2112
  • Unexpected IP address changes in device logs

Network Indicators:

  • Unusual traffic to port 2111/2112 from unauthorized sources
  • SOPAS ET protocol traffic from unexpected IPs

SIEM Query:

source_port:2111 OR source_port:2112 OR destination_port:2111 OR destination_port:2112 | stats count by src_ip, dest_ip

🔗 References

📤 Share & Export