Description
The backup ZIPs are not signed by the application, leading to the possibility that an attacker can download a backup ZIP, modify and re-upload it. This allows the attacker to disrupt the application by configuring the services in a way that they are unable to run, making the application unusable. They can redirect traffic that is meant to be internal to their own hosted services and gathering information.
Published: 2025-06-12
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-18177 The backup ZIPs are not signed by the application, leading to the possibility that an attacker can download a backup ZIP, modify and re-upload it. This allows the attacker to disrupt the application by configuring the services in a way that they are unable to run, making the application unusable. They can redirect traffic that is meant to be internal to their own hosted services and gathering information.
History

Mon, 26 Jan 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Sick
Sick field Analytics
CPEs cpe:2.3:a:sick:field_analytics:*:*:*:*:*:*:*:*
Vendors & Products Sick
Sick field Analytics

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00027}

epss

{'score': 0.00031}


Tue, 17 Jun 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Jun 2025 14:45:00 +0000

Type Values Removed Values Added
Description The backup ZIPs are not signed by the application, leading to the possibility that an attacker can download a backup ZIP, modify and re-upload it. This allows the attacker to disrupt the application by configuring the services in a way that they are unable to run, making the application unusable. They can redirect traffic that is meant to be internal to their own hosted services and gathering information.
Title Backup files can be modified and uploaded
Weaknesses CWE-345
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Sick Field Analytics
cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2025-06-17T19:02:18.155Z

Reserved: 2025-06-03T05:58:15.617Z

Link: CVE-2025-49199

cve-icon Vulnrichment

Updated: 2025-06-12T14:40:48.326Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-12T15:15:40.270

Modified: 2026-01-26T19:26:39.377

Link: CVE-2025-49199

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses