Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18186 | All communication with the REST API is unencrypted (HTTP), allowing an attacker to intercept traffic between an actor and the webserver. This leads to the possibility of information gathering and downloading media files. |
Solution
No solution given by the vendor.
Workaround
Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources "SICK Operating Guidelines" and "ICS-CERT recommended practices on Industrial Security" could help to implement the general security practices.
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 13 Jun 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Credential disclosure | Unencrypted communication (HTTP) |
Fri, 13 Jun 2025 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Jun 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | All communication with the REST API is unencrypted (HTTP), allowing an attacker to intercept traffic between an actor and the webserver. This leads to the possibility of information gathering and downloading media files. | |
| Title | Credential disclosure | |
| Weaknesses | CWE-319 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-06-13T08:18:11.333Z
Reserved: 2025-06-03T05:55:52.772Z
Link: CVE-2025-49183
Updated: 2025-06-12T13:45:48.082Z
Status : Awaiting Analysis
Published: 2025-06-12T14:15:30.580
Modified: 2025-06-12T16:06:20.180
Link: CVE-2025-49183
No data.
OpenCVE Enrichment
No data.
EUVD