Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18194 | The FTP server’s login mechanism does not restrict authentication attempts, allowing an attacker to brute-force user passwords and potentially compromising the FTP server. |
Solution
No solution given by the vendor.
Workaround
It is highly recommended to use a strong password with a length of at least eight characters and a combination of letters, numbers, capital letters and symbols. Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 12 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Jun 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The FTP server’s login mechanism does not restrict authentication attempts, allowing an attacker to brute-force user passwords and potentially compromising the FTP server. | |
| Title | No protection against brute-force attacks | |
| Weaknesses | CWE-307 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-06-13T06:16:40.051Z
Reserved: 2025-06-03T05:58:15.616Z
Link: CVE-2025-49195
Updated: 2025-06-12T14:33:15.494Z
Status : Awaiting Analysis
Published: 2025-06-12T15:15:39.713
Modified: 2025-06-12T16:06:20.180
Link: CVE-2025-49195
No data.
OpenCVE Enrichment
No data.
EUVD