The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.

Project Subscriptions

Vendors Products
Media Server Subscribe
Baggage Analytics Subscribe
Field Analytics Subscribe
Logistic Diagnostic Analytics Subscribe
Package Analytics Subscribe
Tire Analytics Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2025-18188 The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.
Fixes

Solution

No solution given by the vendor.


Workaround

It is highly recommended to use a strong password with a length of at least eight characters and a combination of letters, numbers, capital letters and symbols. Please make also sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.

History

Tue, 03 Feb 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Avaya
Avaya media Server
Sick
Sick baggage Analytics
Sick field Analytics
Sick logistic Diagnostic Analytics
Sick package Analytics
Sick tire Analytics
CPEs cpe:2.3:a:avaya:media_server:-:*:*:*:*:*:*:*
cpe:2.3:a:sick:baggage_analytics:*:*:*:*:*:*:*:*
cpe:2.3:a:sick:field_analytics:*:*:*:*:*:*:*:*
cpe:2.3:a:sick:logistic_diagnostic_analytics:*:*:*:*:*:*:*:*
cpe:2.3:a:sick:package_analytics:*:*:*:*:*:*:*:*
cpe:2.3:a:sick:tire_analytics:*:*:*:*:*:*:*:*
Vendors & Products Avaya
Avaya media Server
Sick
Sick baggage Analytics
Sick field Analytics
Sick logistic Diagnostic Analytics
Sick package Analytics
Sick tire Analytics

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00093}

epss

{'score': 0.00102}


Fri, 13 Jun 2025 09:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

Fri, 13 Jun 2025 08:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-307

Thu, 12 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Jun 2025 13:45:00 +0000

Type Values Removed Values Added
Description The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.
Title No brute-force protection
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2025-10-06T07:20:37.571Z

Reserved: 2025-06-03T05:55:52.772Z

Link: CVE-2025-49186

cve-icon Vulnrichment

Updated: 2025-06-12T13:44:45.369Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-12T14:15:31.013

Modified: 2026-02-03T14:39:11.330

Link: CVE-2025-49186

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses