{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T17:19:39.928","vulnerabilities":[{"cve":{"id":"CVE-2025-49181","sourceIdentifier":"psirt@sick.de","published":"2025-06-12T14:15:30.270","lastModified":"2026-02-03T14:35:29.270","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Due to missing authorization of an API endpoint, unauthorized users can send HTTP GET\nrequests to gather sensitive information. An attacker could also send HTTP POST requests to modify\nthe log files’ root path as well as the TCP ports the service is running on, leading to a Denial of Service\nattack."},{"lang":"es","value":"Debido a la falta de autorización de un endpoint de API, usuarios no autorizados pueden enviar solicitudes HTTP GET para recopilar información confidencial. Un atacante también podría enviar solicitudes HTTP POST para modificar la ruta raíz de los archivos de registro, así como los puertos TCP en los que se ejecuta el servicio, lo que provoca un ataque de denegación de servicio."}],"metrics":{"cvssMetricV31":[{"source":"psirt@sick.de","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.7}]},"weaknesses":[{"source":"psirt@sick.de","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sick:media_server:-:*:*:*:*:*:*:*","matchCriteriaId":"9541865D-6BDE-45B8-AA6C-5858592F43FA"}]}]}],"references":[{"url":"https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF","source":"psirt@sick.de","tags":["Broken Link"]},{"url":"https://sick.com/psirt","source":"psirt@sick.de","tags":["Vendor Advisory"]},{"url":"https://www.cisa.gov/resources-tools/resources/ics-recommended-practices","source":"psirt@sick.de","tags":["US Government Resource"]},{"url":"https://www.first.org/cvss/calculator/3.1","source":"psirt@sick.de","tags":["Not Applicable"]},{"url":"https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0007.json","source":"psirt@sick.de","tags":["Vendor Advisory"]},{"url":"https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0007.pdf","source":"psirt@sick.de","tags":["Vendor Advisory"]}]}}]}