Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources "SICK Operating Guidelines" and "ICS-CERT recommended practices on Industrial Security" could help to implement the general security practices.
Mon, 27 Oct 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sick
Sick tloc100-100 |
|
| Vendors & Products |
Sick
Sick tloc100-100 |
Mon, 27 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A remote unauthenticated attacker may use the unauthenticated C++ API to access or modify sensitive data and disrupt services. | |
| Title | API does not require authentication | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-10-27T18:08:15.868Z
Reserved: 2025-09-16T13:38:29.663Z
Link: CVE-2025-59461
Updated: 2025-10-27T18:08:09.402Z
Status : Awaiting Analysis
Published: 2025-10-27T11:15:40.873
Modified: 2025-10-27T13:19:49.063
Link: CVE-2025-59461
No data.
OpenCVE Enrichment
Updated: 2025-10-27T22:04:15Z