Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18193 | The server supports authentication methods in which credentials are sent in plaintext over unencrypted channels. If an attacker were to intercept traffic between a client and this server, the credentials would be exposed. |
Solution
No solution given by the vendor.
Workaround
Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.
Mon, 26 Jan 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sick
Sick media Server |
|
| CPEs | cpe:2.3:a:sick:media_server:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Sick
Sick media Server |
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 12 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Jun 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The server supports authentication methods in which credentials are sent in plaintext over unencrypted channels. If an attacker were to intercept traffic between a client and this server, the credentials would be exposed. | |
| Title | Unencrypted communication | |
| Weaknesses | CWE-319 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-06-13T06:14:44.270Z
Reserved: 2025-06-03T05:58:15.616Z
Link: CVE-2025-49194
Updated: 2025-06-12T14:33:28.446Z
Status : Analyzed
Published: 2025-06-12T15:15:39.573
Modified: 2026-01-26T19:29:18.937
Link: CVE-2025-49194
No data.
OpenCVE Enrichment
No data.
EUVD