Skip to main content

CVE-2022-27583: CWE-285 in SICK FlexiCompact

Critical
VulnerabilityCVE-2022-27583cvecve-2022-27583cwe-285
Published: Mon Oct 31 2022 (10/31/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: SICK FlexiCompact

Description

A remote unprivileged attacker can interact with the configuration interface of a Flexi-Compact FLX3-CPUC1 or FLX3-CPUC2 running an affected firmware version to potentially impact the availability of the FlexiCompact.

AI-Powered Analysis

AILast updated: 07/05/2025, 14:56:33 UTC

Technical Analysis

CVE-2022-27583 is a critical vulnerability affecting the SICK FlexiCompact FLX3-CPUC1 and FLX3-CPUC2 devices running firmware versions prior to 1.10.0. The vulnerability is classified under CWE-285, which pertains to improper authorization. Specifically, this flaw allows a remote attacker with no privileges and without requiring user interaction to access and interact with the configuration interface of the affected FlexiCompact devices. The vulnerability enables the attacker to potentially disrupt the availability of the device, which is critical in industrial automation environments where these devices are commonly deployed. The CVSS v3.1 base score of 9.1 reflects the high severity, with an attack vector over the network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), and impacts on integrity and availability (I:H, A:H) but no confidentiality impact (C:N). The FlexiCompact devices are industrial controllers used for automation tasks, and disruption can lead to operational downtime or safety risks. Although no known exploits have been reported in the wild, the ease of exploitation and critical impact make this vulnerability a significant threat to industrial control systems using affected firmware versions. No official patch links were provided in the source, indicating that affected organizations must verify firmware updates directly with the vendor or through trusted channels.

Potential Impact

For European organizations, especially those in manufacturing, logistics, and industrial automation sectors, this vulnerability poses a substantial risk. The FlexiCompact controllers are integral to automated processes, and an attacker exploiting this vulnerability could cause denial of service or manipulation of control logic, leading to production halts, equipment damage, or safety incidents. The lack of required authentication and user interaction means that attackers can remotely disrupt operations without insider access or social engineering. This could result in significant financial losses, regulatory non-compliance, and reputational damage. Critical infrastructure operators and industrial enterprises in Europe relying on SICK FlexiCompact devices are particularly vulnerable, as disruption in these environments can have cascading effects on supply chains and public safety.

Mitigation Recommendations

Organizations should immediately verify the firmware version of their SICK FlexiCompact FLX3-CPUC1 and FLX3-CPUC2 devices and upgrade to version 1.10.0 or later where the vulnerability is addressed. In the absence of an official patch, network segmentation should be enforced to isolate these devices from untrusted networks, limiting remote access strictly to authorized personnel and systems. Implementing strict firewall rules and intrusion detection systems to monitor and block unauthorized access attempts to the configuration interface is critical. Additionally, organizations should conduct regular security audits of industrial control systems, enforce strong access controls, and consider deploying anomaly detection solutions tailored for industrial protocols. Vendor engagement is recommended to obtain official patches or mitigations and to stay informed about updates. Finally, incident response plans should be updated to include scenarios involving industrial device compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SICK AG
Date Reserved
2022-03-21T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9b5a

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 2:56:33 PM

Last updated: 8/15/2025, 11:16:40 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats