Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources ”SICK Operating Guidelines” and ”ICS-CERT recommended practices on Industrial Security” could help to implement the general security practices.
Mon, 06 Oct 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 06 Oct 2025 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | JavaScript can be ran inside the address bar via the dashboard "Open in new Tab" Button, making the application vulnerable to session hijacking. | |
Title | Cross Site Scripting: Session Hijacking | |
Weaknesses | CWE-79 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-10-06T12:23:05.532Z
Reserved: 2025-09-03T08:58:58.185Z
Link: CVE-2025-9913

Updated: 2025-10-06T12:23:01.998Z

Status : Awaiting Analysis
Published: 2025-10-06T07:15:36.200
Modified: 2025-10-06T14:56:21.733
Link: CVE-2025-9913

No data.

No data.