Critical severity9.8NVD Advisory· Published Mar 14, 2025· Updated Apr 15, 2026
CVE-2025-27595
CVE-2025-27595
Description
The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDFnvd
- github.security.telekom.com/2025/03/multiple-vulnerabilities-in-sick-dl100.htmlnvd
- sick.com/psirtnvd
- www.cisa.gov/resources-tools/resources/ics-recommended-practicesnvd
- www.first.org/cvss/calculator/3.1nvd
- www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.jsonnvd
- www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.pdfnvd
News mentions
0No linked articles in our index yet.