{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-58586","assignerOrgId":"a6863dd2-93fc-443d-bef1-79f0b5020988","state":"PUBLISHED","assignerShortName":"SICK AG","dateReserved":"2025-09-03T08:58:14.356Z","datePublished":"2025-10-06T07:02:47.270Z","dateUpdated":"2026-05-13T11:56:56.941Z"},"containers":{"cna":{"providerMetadata":{"orgId":"a6863dd2-93fc-443d-bef1-79f0b5020988","shortName":"SICK AG","dateUpdated":"2026-05-13T11:56:56.941Z"},"title":"User Enumeration by excessive error output","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-204","description":"CWE-204 Observable Response Discrepancy","type":"CWE"}]}],"affected":[{"vendor":"SICK AG","product":"Baggage Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"SICK AG","product":"Tire Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"SICK AG","product":"Package Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"SICK AG","product":"Logistic Diagnostic Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"SICK AG","product":"Enterprise Analytics","versions":[{"status":"affected","version":"all versions","versionType":"custom"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"For failed login attempts, the application returns different error messages depending on whether the login failed due to an incorrect password or a non-existing username. This allows an attacker to guess usernames until they find an existing one.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>For failed login attempts, the application returns different error messages depending on whether the login failed due to an incorrect password or a non-existing username. This allows an attacker to guess usernames until they find an existing one.</p>"}]}],"references":[{"url":"https://sick.com/psirt","tags":["x_SICK PSIRT Security Advisories"]},{"url":"https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf","tags":["x_SICK Operating Guidelines"]},{"url":"https://www.cisa.gov/resources-tools/resources/ics-recommended-practices","tags":["x_ICS-CERT recommended practices on Industrial Security"]},{"url":"https://www.first.org/cvss/calculator/3.1","tags":["x_CVSS v3.1 Calculator"]},{"url":"https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.json","tags":["x_The canonical URL."]},{"url":"https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.pdf","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseSeverity":"MEDIUM","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","environmentalScore":5.3,"environmentalSeverity":"MEDIUM","temporalScore":5.3,"temporalSeverity":"MEDIUM"}}],"workarounds":[{"lang":"en","value":"For Enterprise Analytics: Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources ”SICK Operating Guidelines” and ”ICS-CERT recommended practices on Industrial Security” could help to implement the general security practices.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>For Enterprise Analytics: Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources ”SICK Operating Guidelines” and ”ICS-CERT recommended practices on Industrial Security” could help to implement the general security practices.</p>"}]}],"solutions":[{"lang":"en","value":"For Logistic Analytics Products: It is strongly recommended to update the product to version 4.6.3.","supportingMedia":[{"type":"text/html","base64":false,"value":"For Logistic Analytics Products:&nbsp;It is strongly recommended to update the product to version 4.6.3."}]}],"source":{"advisory":"SCA-2025-0010","discovery":"INTERNAL"},"x_generator":{"engine":"csaf2cve 0.2.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-06T18:31:55.879626Z","id":"CVE-2025-58586","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-06T18:32:52.715Z"}}]}}