Executive Summary



This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary
Informations
Name CVE-2025-27595 First vendor Publication 2025-03-14
Vendor Cve Last vendor Modification 2025-03-14

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27595

Sources (Detail)

https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY...
https://github.security.telekom.com/2025/03/multiple-vulnerabilities-in-sick-...
https://sick.com/psirt
https://www.cisa.gov/resources-tools/resources/ics-recommended-practices
https://www.first.org/cvss/calculator/3.1
https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.json
https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.pdf
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2025-03-14 17:20:28
  • First insertion