The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.
References
| Link | Resource |
|---|---|
| https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF | Broken Link |
| https://sick.com/psirt | Vendor Advisory |
| https://www.cisa.gov/resources-tools/resources/ics-recommended-practices | US Government Resource |
| https://www.first.org/cvss/calculator/3.1 | Not Applicable |
| https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0007.json | Vendor Advisory |
| https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0007.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-06-12 14:15
Updated : 2026-02-03 14:39
NVD link : CVE-2025-49186
Mitre link : CVE-2025-49186
CVE.ORG link : CVE-2025-49186
JSON object : View
Products Affected
sick
- logistic_diagnostic_analytics
- baggage_analytics
- tire_analytics
- field_analytics
- package_analytics
avaya
- media_server
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts
