Since the firmware update is not validated, an attacker can install modified firmware on the device. This has a high impact on the availabilty, integrity and confidentiality up to the complete compromise of the device.CreditsManuel StotzTobias JaegerReferenceshttps://sick.com/psirthttps://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDFhttps://www.cisa.gov/resources-tools/resources/ics-recommended-practiceshttps://www.first.org/cvss/calculator/3.1https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0006.pdfhttps://www.sick.com/.well-known/csaf/white/2024/sca-2024-0006.json