{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-58589","assignerOrgId":"a6863dd2-93fc-443d-bef1-79f0b5020988","state":"PUBLISHED","assignerShortName":"SICK AG","dateReserved":"2025-09-03T08:58:53.142Z","datePublished":"2025-10-06T07:03:41.488Z","dateUpdated":"2026-05-13T11:52:23.944Z"},"containers":{"cna":{"providerMetadata":{"orgId":"a6863dd2-93fc-443d-bef1-79f0b5020988","shortName":"SICK AG","dateUpdated":"2026-05-13T11:52:23.944Z"},"title":"Information Disclosure Through Stacktrace","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-200","description":"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor","type":"CWE"}]}],"affected":[{"vendor":"SICK AG","product":"Baggage Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"SICK AG","product":"Tire Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"SICK AG","product":"Package Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"SICK AG","product":"Logistic Diagnostic Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"When an error occurs in the application a full stacktrace is provided to the user. The stacktrace lists class and method names as well as other internal information. An attacker thus receives information about the technology used and the structure of the application.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>When an error occurs in the application a full stacktrace is provided to the user. The stacktrace lists class and method names as well as other internal information. An attacker thus receives information about the technology used and the structure of the application.</p>"}]}],"references":[{"url":"https://sick.com/psirt","tags":["x_SICK PSIRT Security Advisories"]},{"url":"https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf","tags":["x_SICK Operating Guidelines"]},{"url":"https://www.cisa.gov/resources-tools/resources/ics-recommended-practices","tags":["x_ICS-CERT recommended practices on Industrial Security"]},{"url":"https://www.first.org/cvss/calculator/3.1","tags":["x_CVSS v3.1 Calculator"]},{"url":"https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.json","tags":["x_The canonical URL."]},{"url":"https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.pdf","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseSeverity":"LOW","baseScore":2.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N","environmentalScore":2.7,"environmentalSeverity":"LOW","temporalScore":2.7,"temporalSeverity":"LOW"}}],"solutions":[{"lang":"en","value":"It is strongly recommended to update the product to version 4.6.3.","supportingMedia":[{"type":"text/html","base64":false,"value":"It is strongly recommended to update the product to version 4.6.3."}]}],"source":{"advisory":"SCA-2025-0010","discovery":"INTERNAL"},"x_generator":{"engine":"csaf2cve 0.2.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-06T17:53:38.746469Z","id":"CVE-2025-58589","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-06T18:19:55.909Z"}}]}}