No analysis available yet.
Vendor Workaround
Please make sure that you apply general security practices when operating the products. The following General Security Practices and Operating Guidelines could mitigate the associated security risk.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-6435 | The product can be used to distribute malicious code using SDD Device Drivers due to missing download verification checks, leading to code execution on target systems. |
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 14 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 14 Mar 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The product can be used to distribute malicious code using SDD Device Drivers due to missing download verification checks, leading to code execution on target systems. | |
| Title | RCE due to Device Driver | |
| Weaknesses | CWE-494 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-03-14T13:36:49.059Z
Reserved: 2025-03-03T13:27:07.018Z
Link: CVE-2025-27593
Updated: 2025-03-14T13:36:45.823Z
Status : Deferred
Published: 2025-03-14T13:15:40.437
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-27593
No data.
OpenCVE Enrichment
No data.
EUVD