Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources ”SICK Operating Guidelines” and ”ICS-CERT recommended practices on Industrial Security” could help to implement the general security practices.
Mon, 06 Oct 2025 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | If a user tries to login but the provided credentials are incorrect a log is created. The data for this POST requests is not validated and it’s possible to send giant payloads which are then logged. | |
Title | Uncontrolled Resource Consumption via log file | |
Weaknesses | CWE-770 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-10-06T12:18:15.680Z
Reserved: 2025-09-03T08:58:14.355Z
Link: CVE-2025-58582

No data.

Status : Received
Published: 2025-10-06T07:15:34.733
Modified: 2025-10-06T07:15:34.733
Link: CVE-2025-58582

No data.

No data.