{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-58578","assignerOrgId":"a6863dd2-93fc-443d-bef1-79f0b5020988","state":"PUBLISHED","assignerShortName":"SICK AG","dateReserved":"2025-09-03T08:58:14.354Z","datePublished":"2025-10-06T06:47:30.899Z","dateUpdated":"2025-10-06T12:21:55.069Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"Enterprise Analytics","vendor":"SICK AG","versions":[{"status":"affected","version":"all versions","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>A user with the appropriate authorization can create any number of user accounts via an API  endpoint  using  a  POST  request.  There  are  no  quotas,  checking  mechanisms  or restrictions to limit the creation.</p>"}],"value":"A user with the appropriate authorization can create any number of user accounts via an API  endpoint  using  a  POST  request.  There  are  no  quotas,  checking  mechanisms  or restrictions to limit the creation."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":3.8,"baseSeverity":"LOW","confidentialityImpact":"NONE","environmentalScore":3.8,"environmentalSeverity":"LOW","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"UNCHANGED","temporalScore":3.8,"temporalSeverity":"LOW","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-770","description":"CWE-770 Allocation of Resources Without Limits or Throttling","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"a6863dd2-93fc-443d-bef1-79f0b5020988","shortName":"SICK AG","dateUpdated":"2025-10-06T07:08:48.270Z"},"references":[{"tags":["x_SICK PSIRT Security Advisories"],"url":"https://sick.com/psirt"},{"tags":["x_SICK Operating Guidelines"],"url":"https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf"},{"tags":["x_ICS-CERT recommended practices on Industrial Security"],"url":"https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"},{"tags":["x_CVSS v3.1 Calculator"],"url":"https://www.first.org/cvss/calculator/3.1"},{"tags":["x_The canonical URL."],"url":"https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.json"},{"tags":["vendor-advisory"],"url":"https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.pdf"}],"source":{"advisory":"SCA-2025-0010","discovery":"INTERNAL"},"title":"Unlimited user creation by authorized users","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources ”SICK Operating Guidelines” and ”ICS-CERT recommended practices on Industrial Security” could help to implement the general security practices.</p>"}],"value":"Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources ”SICK Operating Guidelines” and ”ICS-CERT recommended practices on Industrial Security” could help to implement the general security practices."}],"x_generator":{"engine":"csaf2cve 0.2.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-06T12:21:47.946354Z","id":"CVE-2025-58578","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-06T12:21:55.069Z"}}]}}