{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-49193","assignerOrgId":"a6863dd2-93fc-443d-bef1-79f0b5020988","state":"PUBLISHED","assignerShortName":"SICK AG","dateReserved":"2025-06-03T05:58:15.616Z","datePublished":"2025-06-12T14:15:07.492Z","dateUpdated":"2026-05-13T12:01:55.151Z"},"containers":{"cna":{"providerMetadata":{"orgId":"a6863dd2-93fc-443d-bef1-79f0b5020988","shortName":"SICK AG","dateUpdated":"2026-05-13T12:01:55.151Z"},"title":"Missing HTTP Security Headers","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-693","description":"CWE-693 Protection Mechanism Failure","type":"CWE"}]}],"affected":[{"vendor":"SICK AG","product":"Field Analytics","versions":[{"status":"affected","version":"all versions","versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"SICK AG","product":"Media Server","versions":[{"status":"affected","version":"0","lessThan":"1.5","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"SICK AG","product":"Baggage Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"SICK AG","product":"Tire Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"SICK AG","product":"Package Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"SICK AG","product":"Logistic Diagnostic Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"The application fails to implement several security headers. These headers help increase the overall security level of the web application by e.g., preventing the application to be displayed in an iFrame (Clickjacking attacks) or not executing injected malicious JavaScript code (XSS attacks).","supportingMedia":[{"type":"text/html","base64":false,"value":"<code>The application fails to implement several security headers. These headers help increase the overall security level of the web application by e.g., preventing the application to be displayed in an iFrame (Clickjacking attacks) or not executing injected malicious JavaScript code (XSS attacks).</code>"}]}],"references":[{"url":"https://sick.com/psirt","tags":["x_SICK PSIRT Website"]},{"url":"https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF","tags":["x_SICK Operating Guidelines"]},{"url":"https://www.cisa.gov/resources-tools/resources/ics-recommended-practices","tags":["x_ICS-CERT recommended practices on Industrial Security"]},{"url":"https://www.first.org/cvss/calculator/3.1","tags":["x_CVSS v3.1 Calculator"]},{"url":"https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0007.pdf","tags":["vendor-advisory"]},{"url":"https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0007.json","tags":["vendor-advisory","x_csaf"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseSeverity":"MEDIUM","baseScore":4.2,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}}],"workarounds":[{"lang":"en","value":"Field Analytics: Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \\\"SICK Operating Guidelines\\\" and \\\"ICS-CERT recommended practices on Industrial Security\\\" could help to implement the general security practices.","supportingMedia":[{"type":"text/html","base64":false,"value":"<code>Field Analytics: Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \\\"SICK Operating Guidelines\\\" and \\\"ICS-CERT recommended practices on Industrial Security\\\" could help to implement the general security practices.</code>"}]}],"solutions":[{"lang":"en","value":"Media Server: Users are strongly recommended to upgrade to the latest release of Media Server (>= 1.5).","supportingMedia":[{"type":"text/html","base64":false,"value":"<code>Media Server: Users are strongly recommended to upgrade to the latest release of Media Server (&gt;= 1.5).</code>"}]},{"lang":"en","value":"For Logistic Analytics Products: It is strongly recommended to update the product to version 4.6.3.","supportingMedia":[{"type":"text/html","base64":false,"value":"For Logistic Analytics Products: It is strongly recommended to update the product to version 4.6.3.&nbsp;<br>"}]}],"source":{"advisory":"sca-2025-0007","discovery":"INTERNAL"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-12T14:33:45.757872Z","id":"CVE-2025-49193","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-12T14:33:49.766Z"}}]}}