{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-49192","assignerOrgId":"a6863dd2-93fc-443d-bef1-79f0b5020988","state":"PUBLISHED","assignerShortName":"SICK AG","dateReserved":"2025-06-03T05:58:15.616Z","datePublished":"2025-06-12T14:12:11.750Z","dateUpdated":"2025-06-12T14:34:02.694Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"SICK Field Analytics","vendor":"SICK AG","versions":[{"status":"affected","version":"all versions","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"SICK Media Server","vendor":"SICK AG","versions":[{"lessThan":"1.5","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<code>The web application is vulnerable to clickjacking attacks. The site can be embedded into another frame, allowing an attacker to trick a user into clicking on something different from what the user perceives. This could potentially reveal confidential information or allow others to take control of their computer while clicking on seemingly innocuous objects.</code>"}],"value":"The web application is vulnerable to clickjacking attacks. The site can be embedded into another frame, allowing an attacker to trick a user into clicking on something different from what the user perceives. This could potentially reveal confidential information or allow others to take control of their computer while clicking on seemingly innocuous objects."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1021","description":"CWE-1021 Improper Restriction of Rendered UI Layers or Frames","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"a6863dd2-93fc-443d-bef1-79f0b5020988","shortName":"SICK AG","dateUpdated":"2025-06-12T14:12:11.750Z"},"references":[{"tags":["x_SICK PSIRT Website"],"url":"https://sick.com/psirt"},{"tags":["x_SICK Operating Guidelines"],"url":"https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF"},{"tags":["x_ICS-CERT recommended practices on Industrial Security"],"url":"https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"},{"tags":["x_CVSS v3.1 Calculator"],"url":"https://www.first.org/cvss/calculator/3.1"},{"tags":["vendor-advisory"],"url":"https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0007.pdf"},{"tags":["vendor-advisory","x_csaf"],"url":"https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0007.json"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<code>\n\nMedia Server: Users are strongly recommended to upgrade to the latest release of Media Server (&gt;= 1.5).</code>"}],"value":"Media Server: Users are strongly recommended to upgrade to the latest release of Media Server (>= 1.5)."}],"source":{"advisory":"sca-2025-0007","discovery":"INTERNAL"},"title":"Clickjacking","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<code>Field Analytics: Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \\\"SICK Operating Guidelines\\\" and \\\"ICS-CERT recommended practices on Industrial Security\\\" could help to implement the general security practices.</code>"}],"value":"Field Analytics: Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \\\"SICK Operating Guidelines\\\" and \\\"ICS-CERT recommended practices on Industrial Security\\\" could help to implement the general security practices."}],"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-12T14:33:58.560372Z","id":"CVE-2025-49192","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-12T14:34:02.694Z"}}]}}