Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources ”SICK Operating Guidelines” and ”ICS-CERT recommended practices on Industrial Security” could help to implement the general security practices. Additionally, the web server can be disabled via the CyberSecurity page in the UI.
Mon, 28 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 28 Apr 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The multiScan and picoScan are vulnerable to a denial-of-service (DoS) attack. A remote attacker can exploit this vulnerability by conducting a Slowloris-type attack, causing the web page to become unresponsive. | |
Title | DoS attack by conducting a slowloris-type attack | |
Weaknesses | CWE-400 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-04-28T16:30:57.990Z
Reserved: 2025-04-09T07:42:18.369Z
Link: CVE-2025-32472

Updated: 2025-04-28T16:29:19.228Z

Status : Awaiting Analysis
Published: 2025-04-28T13:15:23.053
Modified: 2025-04-29T13:52:10.697
Link: CVE-2025-32472

No data.

No data.