Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18184 | The application sends user credentials as URL parameters instead of POST bodies, making it vulnerable to information gathering. |
Solution
No solution given by the vendor.
Workaround
Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 17 Jun 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The application sends user credentials as URL parameters instead of POST bodies, making it vulnerable to information gathering. | |
| Title | Sensitive Data in URL | |
| Weaknesses | CWE-598 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-06-17T19:04:38.200Z
Reserved: 2025-06-03T05:55:52.772Z
Link: CVE-2025-49188
Updated: 2025-06-12T14:14:46.972Z
Status : Awaiting Analysis
Published: 2025-06-12T14:15:31.293
Modified: 2025-06-12T16:06:20.180
Link: CVE-2025-49188
No data.
OpenCVE Enrichment
No data.
EUVD