Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 17 Jun 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 12 Jun 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The created backup files are unencrypted, making the application vulnerable for gathering sensitive information by downloading and decompressing the backup files. | |
Title | Unencrypted backup contains sensitive information | |
Weaknesses | CWE-200 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-06-17T18:59:46.867Z
Reserved: 2025-06-03T05:58:15.617Z
Link: CVE-2025-49200

Updated: 2025-06-12T14:41:20.849Z

Status : Awaiting Analysis
Published: 2025-06-12T15:15:40.410
Modified: 2025-06-12T16:06:20.180
Link: CVE-2025-49200

No data.

No data.