Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources ”SICK Operating Guidelines” and ”ICS-CERT recommended practices on Industrial Security” could help to implement the general security practices.
Mon, 06 Oct 2025 07:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | User Enumeration with prefilled information | User Enumeration |
Mon, 06 Oct 2025 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The application provides access to a login protected H2 database for caching purposes. The username is prefilled. | |
Title | User Enumeration with prefilled information | |
Weaknesses | CWE-497 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-10-06T07:10:37.403Z
Reserved: 2025-09-03T08:58:14.355Z
Link: CVE-2025-58583

No data.

Status : Received
Published: 2025-10-06T07:15:34.890
Modified: 2025-10-06T07:15:34.890
Link: CVE-2025-58583

No data.

No data.