The application uses a weak password hash function, allowing an attacker to crack the weak password hash to gain access to an FTP user account.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-18179 The application uses a weak password hash function, allowing an attacker to crack the weak password hash to gain access to an FTP user account.
Fixes

Solution

It is strongly recommended to upgrade to the latest version.


Workaround

No workaround given by the vendor.

History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00016}

epss

{'score': 0.00019}


Tue, 17 Jun 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Jun 2025 14:45:00 +0000

Type Values Removed Values Added
Description The application uses a weak password hash function, allowing an attacker to crack the weak password hash to gain access to an FTP user account.
Title Deprecated TLS version supported
Weaknesses CWE-328
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2025-06-17T19:03:20.901Z

Reserved: 2025-06-03T05:58:15.616Z

Link: CVE-2025-49197

cve-icon Vulnrichment

Updated: 2025-06-12T14:39:23.558Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-12T15:15:39.987

Modified: 2025-06-12T16:06:20.180

Link: CVE-2025-49197

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.