The application is vulnerable to cross-site request forgery. An attacker can trick a valid, logged in user into submitting a web request that they did not intend. The request uses the victim's browser's saved authorization to execute the request.
References
| Link | Resource |
|---|---|
| https://sick.com/psirt | Vendor Advisory |
| https://sick.com/psirt | Vendor Advisory |
| https://www.cisa.gov/resources-tools/resources/ics-recommended-practices | US Government Resource |
| https://www.endress.com | Product |
| https://www.first.org/cvss/calculator/3.1 | Not Applicable |
| https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json | Vendor Advisory |
| https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-07-03 12:15
Updated : 2026-02-06 14:39
NVD link : CVE-2025-27454
Mitre link : CVE-2025-27454
CVE.ORG link : CVE-2025-27454
JSON object : View
Products Affected
endress
- meac300-fnade4_firmware
- meac300-fnade4
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
