CVE-2025-49186 PUBLISHED

No brute-force protection

Assigner: SICK AG
Reserved: 03.06.2025 Published: 12.06.2025 Updated: 13.06.2025

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS Score: 5.3

Product Status

Vendor SICK AG
Product SICK Field Analytics
Versions Default: affected
  • Version all versions is affected
Vendor SICK AG
Product SICK Media Server
Versions Default: affected
  • Version all versions is affected

Workarounds

It is highly recommended to use a strong password with a length of at least eight characters and a combination of letters, numbers, capital letters and symbols. Please make also sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.

References

Problem Types

  • CWE-307 Improper Restriction of Excessive Authentication Attempts CWE