{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T15:25:13.336","vulnerabilities":[{"cve":{"id":"CVE-2024-10773","sourceIdentifier":"psirt@sick.de","published":"2024-12-06T13:15:05.897","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The product is vulnerable to pass-the-hash attacks in combination with hardcoded credentials of hidden user levels. This means that an attacker can log in with the hidden user levels and gain\nfull access to the device."},{"lang":"es","value":"El producto es vulnerable a ataques de tipo pass-the-hash en combinación con credenciales codificadas de niveles de usuario ocultos. Esto significa que un atacante puede iniciar sesión con los niveles de usuario ocultos y obtener acceso total al dispositivo."}],"metrics":{"cvssMetricV31":[{"source":"psirt@sick.de","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":9.0,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":6.0}]},"weaknesses":[{"source":"psirt@sick.de","type":"Secondary","description":[{"lang":"en","value":"CWE-912"}]}],"references":[{"url":"https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF","source":"psirt@sick.de"},{"url":"https://sick.com/psirt","source":"psirt@sick.de"},{"url":"https://www.cisa.gov/resources-tools/resources/ics-recommended-practices","source":"psirt@sick.de"},{"url":"https://www.first.org/cvss/calculator/3.1","source":"psirt@sick.de"},{"url":"https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0006.json","source":"psirt@sick.de"},{"url":"https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0006.pdf","source":"psirt@sick.de"}]}}]}