{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-49186","assignerOrgId":"a6863dd2-93fc-443d-bef1-79f0b5020988","state":"PUBLISHED","assignerShortName":"SICK AG","dateReserved":"2025-06-03T05:55:52.772Z","datePublished":"2025-06-12T13:27:43.484Z","dateUpdated":"2026-05-13T11:59:58.918Z"},"containers":{"cna":{"providerMetadata":{"orgId":"a6863dd2-93fc-443d-bef1-79f0b5020988","shortName":"SICK AG","dateUpdated":"2026-05-13T11:59:58.918Z"},"title":"No brute-force protection","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-307","description":"CWE-307 Improper Restriction of Excessive Authentication Attempts","type":"CWE"}]}],"affected":[{"vendor":"SICK AG","product":"Field Analytics","versions":[{"status":"affected","version":"all versions","versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"SICK AG","product":"Baggage Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"SICK AG","product":"Tire Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"SICK AG","product":"Package Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"SICK AG","product":"Logistic Diagnostic Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.","supportingMedia":[{"type":"text/html","base64":false,"value":"<code>The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.</code>"}]}],"references":[{"url":"https://sick.com/psirt","tags":["x_SICK PSIRT Website"]},{"url":"https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF","tags":["x_SICK Operating Guidelines"]},{"url":"https://www.cisa.gov/resources-tools/resources/ics-recommended-practices","tags":["x_ICS-CERT recommended practices on Industrial Security"]},{"url":"https://www.first.org/cvss/calculator/3.1","tags":["x_CVSS v3.1 Calculator"]},{"url":"https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0007.pdf","tags":["vendor-advisory"]},{"url":"https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0007.json","tags":["vendor-advisory","x_csaf"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseSeverity":"MEDIUM","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}}],"workarounds":[{"lang":"en","value":"For Field Analytics: It is highly recommended to use a strong password with a length of at least eight characters and a combination of letters, numbers, capital letters and symbols. Please make also sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \\\"SICK Operating Guidelines\\\" and \\\"ICS-CERT recommended practices on Industrial Security\\\" could help to implement the general security practices.","supportingMedia":[{"type":"text/html","base64":false,"value":"<code>For Field Analytics: It is highly recommended to use a strong password with a length of at least eight characters and a combination of letters, numbers, capital letters and symbols. Please make also sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \\\"SICK Operating Guidelines\\\" and \\\"ICS-CERT recommended practices on Industrial Security\\\" could help to implement the general security practices.</code>"}]}],"solutions":[{"lang":"en","value":"For Logistic Analytics Products: It is strongly recommended to update the product to version 4.6.3.","supportingMedia":[{"type":"text/html","base64":false,"value":"For Logistic Analytics Products:&nbsp;It is strongly recommended to update the product to version 4.6.3."}]}],"source":{"advisory":"sca-2025-0007","discovery":"INTERNAL"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-12T13:44:43.611024Z","id":"CVE-2025-49186","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-12T13:44:51.526Z"}}]}}