Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32470: CWE-284 (Improper Access Control) in SICK AG SICK FLX0-GPNT100

0
High
VulnerabilityCVE-2025-32470cvecve-2025-32470cwe-284
Published: Mon Apr 28 2025 (04/28/2025, 09:07:02 UTC)
Source: CVE
Vendor/Project: SICK AG
Product: SICK FLX0-GPNT100

Description

A remote unauthenticated attacker may be able to change the IP adress of the device, and therefore affecting the availability of the device.

AI-Powered Analysis

AILast updated: 06/24/2025, 19:22:11 UTC

Technical Analysis

CVE-2025-32470 is a high-severity vulnerability affecting all versions of the SICK FLX0-GPNT100 device, a product by SICK AG. The vulnerability is categorized under CWE-284, indicating improper access control. Specifically, it allows a remote attacker with no authentication and no user interaction required to change the IP address configuration of the device. This manipulation can disrupt the device's network availability, effectively causing denial of service or network misconfiguration. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and no privileges required (PR:N). The vulnerability does not impact confidentiality or integrity but severely impacts availability (A:H). Since the device is likely used in industrial or automation environments, changing its IP address remotely can isolate it from the network or cause communication failures with other systems, potentially halting automated processes or safety monitoring. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability was reserved on April 9, 2025, and published on April 28, 2025, indicating recent discovery and disclosure. The lack of authentication and user interaction requirements makes exploitation straightforward for an attacker with network access to the device. The vulnerability's scope is limited to the device itself but can have cascading effects on the industrial or operational technology environment relying on it.

Potential Impact

For European organizations, especially those in manufacturing, logistics, or critical infrastructure sectors using SICK FLX0-GPNT100 devices, this vulnerability poses a significant risk to operational continuity. The ability to remotely change the device's IP address can lead to loss of device availability, disrupting automated processes, safety systems, or monitoring functions. This can result in production downtime, safety hazards, and financial losses. Since the device is likely integrated into industrial control systems, the impact extends beyond a single device to potentially affect entire production lines or safety mechanisms. The disruption of availability without affecting confidentiality or integrity means that attackers can cause denial of service without leaving obvious traces of tampering, complicating incident detection and response. European organizations with extensive industrial automation deployments are particularly vulnerable, as network segmentation and device hardening may not be sufficient if the attacker gains network access. The absence of known exploits currently provides a window for mitigation, but the ease of exploitation and lack of authentication requirements mean that the threat could escalate rapidly if exploited in the wild.

Mitigation Recommendations

Implement strict network segmentation to isolate SICK FLX0-GPNT100 devices from general IT networks and restrict access to trusted management networks only. Deploy network-level access controls such as firewalls and intrusion detection/prevention systems to monitor and block unauthorized attempts to access device management interfaces. Use VPNs or secure tunnels for remote access to the devices to ensure that only authenticated and authorized personnel can reach the device network. Continuously monitor network traffic for unusual IP address changes or device communication failures that may indicate exploitation attempts. Engage with SICK AG for updates and patches; prioritize applying any forthcoming security patches or firmware updates addressing this vulnerability. Where possible, implement device-level logging and alerting to detect configuration changes, including IP address modifications. Conduct regular security audits and penetration testing focused on industrial control systems to identify and remediate similar access control weaknesses. Develop and rehearse incident response plans specifically for industrial device availability disruptions to minimize downtime in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SICK AG
Date Reserved
2025-04-09T07:42:18.369Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef756

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 7:22:11 PM

Last updated: 11/22/2025, 7:32:56 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats