The hard drives of the device are not encrypted using a full volume encryption feature such as BitLocker. This allows an attacker with physical access to the device to use an alternative operating system to interact with the hard drives, completely circumventing the Windows login. The attacker can read from and write to all files on the hard drives.
References
| Link | Resource |
|---|---|
| https://sick.com/psirt | Vendor Advisory |
| https://sick.com/psirt | Vendor Advisory |
| https://www.cisa.gov/resources-tools/resources/ics-recommended-practices | US Government Resource |
| https://www.endress.com | Product |
| https://www.first.org/cvss/calculator/3.1 | Not Applicable |
| https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json | Vendor Advisory |
| https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-07-03 12:15
Updated : 2026-02-06 14:39
NVD link : CVE-2025-27460
Mitre link : CVE-2025-27460
CVE.ORG link : CVE-2025-27460
JSON object : View
Products Affected
endress
- meac300-fnade4_firmware
- meac300-fnade4
