Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources "SICK Operating Guidelines" and "ICS-CERT recommended practices on Industrial Security" could help to implement the general security practices.
Mon, 03 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sick tloc100-100 Firmware
|
|
| CPEs | cpe:2.3:h:sick:tloc100-100:-:*:*:*:*:*:*:* cpe:2.3:o:sick:tloc100-100_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Sick tloc100-100 Firmware
|
Mon, 27 Oct 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sick
Sick tloc100-100 |
|
| Vendors & Products |
Sick
Sick tloc100-100 |
Mon, 27 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker who tampers with the C++ CLI client may crash the UpdateService during file transfers, disrupting updates and availability. | |
| Title | Denial-of-service (DoS) via delayed or missing client response | |
| Weaknesses | CWE-248 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-10-27T18:07:30.977Z
Reserved: 2025-09-16T13:38:29.663Z
Link: CVE-2025-59462
Updated: 2025-10-27T18:07:26.984Z
Status : Analyzed
Published: 2025-10-27T11:15:41.013
Modified: 2025-11-03T19:36:56.653
Link: CVE-2025-59462
No data.
OpenCVE Enrichment
Updated: 2025-10-27T22:03:54Z