Project Subscriptions
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18188 | The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks. |
Solution
No solution given by the vendor.
Workaround
It is highly recommended to use a strong password with a length of at least eight characters and a combination of letters, numbers, capital letters and symbols. Please make also sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.
Tue, 03 Feb 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Avaya
Avaya media Server Sick Sick baggage Analytics Sick field Analytics Sick logistic Diagnostic Analytics Sick package Analytics Sick tire Analytics |
|
| CPEs | cpe:2.3:a:avaya:media_server:-:*:*:*:*:*:*:* cpe:2.3:a:sick:baggage_analytics:*:*:*:*:*:*:*:* cpe:2.3:a:sick:field_analytics:*:*:*:*:*:*:*:* cpe:2.3:a:sick:logistic_diagnostic_analytics:*:*:*:*:*:*:*:* cpe:2.3:a:sick:package_analytics:*:*:*:*:*:*:*:* cpe:2.3:a:sick:tire_analytics:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Avaya
Avaya media Server Sick Sick baggage Analytics Sick field Analytics Sick logistic Diagnostic Analytics Sick package Analytics Sick tire Analytics |
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 13 Jun 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 |
Fri, 13 Jun 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-307 |
Thu, 12 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Jun 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks. | |
| Title | No brute-force protection | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-10-06T07:20:37.571Z
Reserved: 2025-06-03T05:55:52.772Z
Link: CVE-2025-49186
Updated: 2025-06-12T13:44:45.369Z
Status : Analyzed
Published: 2025-06-12T14:15:31.013
Modified: 2026-02-03T14:39:11.330
Link: CVE-2025-49186
No data.
OpenCVE Enrichment
No data.
EUVD