Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources ”SICK Operating Guidelines” and ”ICS-CERT recommended practices on Industrial Security” could help to implement the general security practices.
Mon, 06 Oct 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 06 Oct 2025 07:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Authentication bypass with local user database |
Mon, 06 Oct 2025 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The credentials of the users stored in the system's local database can be used for the log in, making it possible for an attacker to gain unauthorized access. This could potentially affect the confidentiality of the application. | |
Title | Authentication bypass with local user database | |
Weaknesses | CWE-288 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-10-06T12:22:47.631Z
Reserved: 2025-09-03T08:59:00.184Z
Link: CVE-2025-9914

Updated: 2025-10-06T12:22:44.526Z

Status : Awaiting Analysis
Published: 2025-10-06T07:15:36.363
Modified: 2025-10-06T14:56:21.733
Link: CVE-2025-9914

No data.

No data.