Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources "SICK Operating Guidelines" and "ICS-CERT recommended practices on Industrial Security" could help to implement the general security practices.
Mon, 27 Oct 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sick
Sick tloc100-100 |
|
| Vendors & Products |
Sick
Sick tloc100-100 |
Mon, 27 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker who tampers with the C++ CLI client may crash the UpdateService during file transfers, disrupting updates and availability. | |
| Title | Denial-of-service (DoS) via delayed or missing client response | |
| Weaknesses | CWE-248 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-10-27T18:07:30.977Z
Reserved: 2025-09-16T13:38:29.663Z
Link: CVE-2025-59462
Updated: 2025-10-27T18:07:26.984Z
Status : Awaiting Analysis
Published: 2025-10-27T11:15:41.013
Modified: 2025-10-27T13:19:49.063
Link: CVE-2025-59462
No data.
OpenCVE Enrichment
Updated: 2025-10-27T22:03:54Z