Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
It is highly recommended to use a strong password with a length of at least eight characters and a combination of letters, numbers, capital letters and symbols. Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Thu, 12 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 12 Jun 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | For failed login attempts, the application returns different error messages depending on whether the login failed due to an incorrect password or a non-existing username. This allows an attacker to guess usernames until they find an existing one. | |
Title | User enumeration | |
Weaknesses | CWE-204 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-06-12T13:43:49.791Z
Reserved: 2025-06-03T05:55:52.772Z
Link: CVE-2025-49187

Updated: 2025-06-12T13:43:46.383Z

Status : Awaiting Analysis
Published: 2025-06-12T14:15:31.153
Modified: 2025-06-12T16:06:20.180
Link: CVE-2025-49187

No data.

No data.