{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-9914","assignerOrgId":"a6863dd2-93fc-443d-bef1-79f0b5020988","state":"PUBLISHED","assignerShortName":"SICK AG","dateReserved":"2025-09-03T08:59:00.184Z","datePublished":"2025-10-06T06:45:59.874Z","dateUpdated":"2026-05-13T11:48:19.759Z"},"containers":{"cna":{"providerMetadata":{"orgId":"a6863dd2-93fc-443d-bef1-79f0b5020988","shortName":"SICK AG","dateUpdated":"2026-05-13T11:48:19.759Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-288","description":"CWE-288 Authentication Bypass Using an Alternate Path or Channel","type":"CWE"}]}],"affected":[{"vendor":"SICK AG","product":"Baggage Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"SICK AG","product":"Tire Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"SICK AG","product":"Package Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"SICK AG","product":"Logistic Diagnostic Analytics","versions":[{"status":"affected","version":"0","lessThan":"4.6.3","versionType":"custom"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"The credentials of the users stored in the system's local database can be used for the log in, making it possible for an attacker to gain unauthorized access. This could potentially affect the confidentiality of the application.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>The credentials of the users stored in the system's local database can be used for the log in, making it possible for an attacker to gain unauthorized access. This could potentially affect the confidentiality of the application.</p>"}]}],"references":[{"url":"https://sick.com/psirt","tags":["x_SICK PSIRT Security Advisories"]},{"url":"https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf","tags":["x_SICK Operating Guidelines"]},{"url":"https://www.cisa.gov/resources-tools/resources/ics-recommended-practices","tags":["x_ICS-CERT recommended practices on Industrial Security"]},{"url":"https://www.first.org/cvss/calculator/3.1","tags":["x_CVSS v3.1 Calculator"]},{"url":"https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.json","tags":["x_The canonical URL."]},{"url":"https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.pdf","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseSeverity":"MEDIUM","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","environmentalScore":4.3,"environmentalSeverity":"MEDIUM","temporalScore":4.3,"temporalSeverity":"MEDIUM"}}],"solutions":[{"lang":"en","value":"It is strongly recommended to update the product to version 4.6.3.","supportingMedia":[{"type":"text/html","base64":false,"value":"It is strongly recommended to update the product to version 4.6.3."}]}],"source":{"advisory":"SCA-2025-0010","discovery":"INTERNAL"},"x_generator":{"engine":"csaf2cve 0.2.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-06T12:22:41.072841Z","id":"CVE-2025-9914","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-06T12:22:47.631Z"}}]}}