Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-32508 | For failed login attempts, the application returns different error messages depending on whether the login failed due to an incorrect password or a non-existing username. This allows an attacker to guess usernames until they find an existing one. |
Solution
No solution given by the vendor.
Workaround
Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources ”SICK Operating Guidelines” and ”ICS-CERT recommended practices on Industrial Security” could help to implement the general security practices.
Mon, 06 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Oct 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | For failed login attempts, the application returns different error messages depending on whether the login failed due to an incorrect password or a non-existing username. This allows an attacker to guess usernames until they find an existing one. | |
| Title | User Enumeration by excessive error output | |
| Weaknesses | CWE-204 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-10-06T18:32:52.715Z
Reserved: 2025-09-03T08:58:14.356Z
Link: CVE-2025-58586
Updated: 2025-10-06T18:32:48.937Z
Status : Awaiting Analysis
Published: 2025-10-06T07:15:35.390
Modified: 2025-10-06T14:56:21.733
Link: CVE-2025-58586
No data.
OpenCVE Enrichment
No data.
EUVD