Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources "SICK Operating Guidelines" and "ICS-CERT recommended practices on Industrial Security" could help to implement the general security practices.
Mon, 27 Oct 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sick
Sick tloc100-100 |
|
| Vendors & Products |
Sick
Sick tloc100-100 |
Mon, 27 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Oct 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The device is running an outdated operating system, which may be susceptible to known vulnerabilities. | |
| Title | Ubuntu version has reached the end of standard support | |
| Weaknesses | CWE-1104 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-10-27T15:28:31.434Z
Reserved: 2025-09-16T13:38:31.926Z
Link: CVE-2025-10561
Updated: 2025-10-27T15:28:20.408Z
Status : Awaiting Analysis
Published: 2025-10-27T10:15:36.920
Modified: 2025-10-27T13:19:49.063
Link: CVE-2025-10561
No data.
OpenCVE Enrichment
Updated: 2025-10-27T22:04:06Z