The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device.
Fixes

Solution

No solution given by the vendor.


Workaround

Please make sure that you apply general security practices when operating the products. The following General Security Practices and Operating Guidelines could mitigate the associated security risk.

History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00059}

epss

{'score': 0.00081}


Fri, 14 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 14 Mar 2025 13:00:00 +0000

Type Values Removed Values Added
Description The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device.
Title Weak hashing alghrythm
Weaknesses CWE-328
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2025-03-14T13:35:00.490Z

Reserved: 2025-03-03T13:27:07.018Z

Link: CVE-2025-27595

cve-icon Vulnrichment

Updated: 2025-03-14T13:34:56.505Z

cve-icon NVD

Status : Received

Published: 2025-03-14T13:15:40.763

Modified: 2025-03-14T13:15:40.763

Link: CVE-2025-27595

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.