Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-32498 | When an error occurs in the application a full stacktrace is provided to the user. The stacktrace lists class and method names as well as other internal information. An attacker can thus obtain information about the technology used and the structure of the application. |
Solution
No solution given by the vendor.
Workaround
Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources ”SICK Operating Guidelines” and ”ICS-CERT recommended practices on Industrial Security” could help to implement the general security practices.
Mon, 06 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sick
Sick enterprise Analytics |
|
| Vendors & Products |
Sick
Sick enterprise Analytics |
Mon, 06 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Oct 2025 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When an error occurs in the application a full stacktrace is provided to the user. The stacktrace lists class and method names as well as other internal information. An attacker can thus obtain information about the technology used and the structure of the application. | |
| Title | Information Disclosure Through Stacktrace-/MQTT/Config/changeAll | |
| Weaknesses | CWE-200 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-10-06T12:18:57.605Z
Reserved: 2025-09-03T08:58:14.355Z
Link: CVE-2025-58581
Updated: 2025-10-06T12:18:54.434Z
Status : Awaiting Analysis
Published: 2025-10-06T07:15:34.567
Modified: 2025-10-06T14:56:21.733
Link: CVE-2025-58581
No data.
OpenCVE Enrichment
Updated: 2025-10-06T14:39:53Z
EUVD