Description
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.
Published: 2025-06-12
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

It is highly recommended to use a strong password with a length of at least eight characters and a combination of letters, numbers, capital letters and symbols. Please make also sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-18188 The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.
History

Tue, 03 Feb 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Avaya
Avaya media Server
Sick
Sick baggage Analytics
Sick field Analytics
Sick logistic Diagnostic Analytics
Sick package Analytics
Sick tire Analytics
CPEs cpe:2.3:a:avaya:media_server:-:*:*:*:*:*:*:*
cpe:2.3:a:sick:baggage_analytics:*:*:*:*:*:*:*:*
cpe:2.3:a:sick:field_analytics:*:*:*:*:*:*:*:*
cpe:2.3:a:sick:logistic_diagnostic_analytics:*:*:*:*:*:*:*:*
cpe:2.3:a:sick:package_analytics:*:*:*:*:*:*:*:*
cpe:2.3:a:sick:tire_analytics:*:*:*:*:*:*:*:*
Vendors & Products Avaya
Avaya media Server
Sick
Sick baggage Analytics
Sick field Analytics
Sick logistic Diagnostic Analytics
Sick package Analytics
Sick tire Analytics

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00093}

epss

{'score': 0.00102}


Fri, 13 Jun 2025 09:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

Fri, 13 Jun 2025 08:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-307

Thu, 12 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Jun 2025 13:45:00 +0000

Type Values Removed Values Added
Description The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.
Title No brute-force protection
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Avaya Media Server
Sick Baggage Analytics Field Analytics Logistic Diagnostic Analytics Package Analytics Tire Analytics
cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2025-10-06T07:20:37.571Z

Reserved: 2025-06-03T05:55:52.772Z

Link: CVE-2025-49186

cve-icon Vulnrichment

Updated: 2025-06-12T13:44:45.369Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-12T14:15:31.013

Modified: 2026-02-03T14:39:11.330

Link: CVE-2025-49186

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses