Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-32511 | In the HTTP request, the username and password are transferred directly in the URL as parameters. However, URLs can be stored in various systems such as server logs, browser histories or proxy servers. As a result, there is a high risk that this sensitive data will be disclosed unintentionally. |
Solution
No solution given by the vendor.
Workaround
Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources ”SICK Operating Guidelines” and ”ICS-CERT recommended practices on Industrial Security” could help to implement the general security practices.
Mon, 06 Oct 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Oct 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the HTTP request, the username and password are transferred directly in the URL as parameters. However, URLs can be stored in various systems such as server logs, browser histories or proxy servers. As a result, there is a high risk that this sensitive data will be disclosed unintentionally. | |
| Title | Plain Text Transmission of Username and Password in the URL | |
| Weaknesses | CWE-598 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-10-06T16:37:23.793Z
Reserved: 2025-09-03T08:58:14.356Z
Link: CVE-2025-58584
Updated: 2025-10-06T16:37:20.327Z
Status : Awaiting Analysis
Published: 2025-10-06T07:15:35.063
Modified: 2025-10-06T14:56:21.733
Link: CVE-2025-58584
No data.
OpenCVE Enrichment
No data.
EUVD