Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-49181— Configurations endpoint does not require authorization

CVSS 8.6 · High EPSS 0.59% · P69
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-49181

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Configurations endpoint does not require authorization
Source: NVD (National Vulnerability Database)
Vulnerability Description
Due to missing authorization of an API endpoint, unauthorized users can send HTTP GET requests to gather sensitive information. An attacker could also send HTTP POST requests to modify the log files’ root path as well as the TCP ports the service is running on, leading to a Denial of Service attack.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
授权机制缺失
Source: NVD (National Vulnerability Database)
Vulnerability Title
SICK Field Analytics和SICK Media Server 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SICK Field Analytics和SICK Media Server都是德国SICK公司的产品。SICK Field Analytics是一款用于评估制造数据的软件。SICK Media Server是一款媒体服务器。 SICK Field Analytics和SICK Media Server存在安全漏洞,该漏洞源于API端点缺少授权,可能导致信息泄露和拒绝服务攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
SICK AGSICK Media Server all versions -

II. Public POCs for CVE-2025-49181

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-49181

登录查看更多情报信息。

Same Patch Batch · SICK AG · 2025-06-12 · 20 CVEs total

CVE-2025-491998.8 HIGHBackup files can be modified and uploaded
CVE-2025-491827.5 HIGHCredential disclosure
CVE-2025-491837.5 HIGHUnencrypted communication (HTTP)
CVE-2025-491847.5 HIGHInformation disclosure to unauthorized user
CVE-2025-491947.5 HIGHUnencrypted communication
CVE-2025-491966.5 MEDIUMDeprecated TLS version supported
CVE-2025-491976.5 MEDIUMDeprecated TLS version supported
CVE-2025-492006.5 MEDIUMUnencrypted backup contains sensitive information
CVE-2025-491855.5 MEDIUMStored Cross-Site-Script
CVE-2025-491955.3 MEDIUMNo protection against brute-force attacks
CVE-2025-491895.3 MEDIUMCookie missing HttpOnly flag
CVE-2025-491885.3 MEDIUMSensitive Data in URL
CVE-2025-491875.3 MEDIUMUser enumeration
CVE-2025-491865.3 MEDIUMNo brute-force protection
CVE-2025-491914.8 MEDIUMDashboards and iFrames can link malicious web content
CVE-2025-491924.3 MEDIUMClickjacking
CVE-2025-491904.3 MEDIUMServer-Side Request Forgery
CVE-2025-491934.2 MEDIUMMissing HTTP Security Headers
CVE-2025-491983.1 LOWPoor quality of randomness in authorization tokens

IV. Related Vulnerabilities

V. Comments for CVE-2025-49181

No comments yet


Leave a comment