Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-49197— Deprecated TLS version supported

CVSS 6.5 · Medium EPSS 0.16% · P37
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-49197

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Deprecated TLS version supported
Source: NVD (National Vulnerability Database)
Vulnerability Description
The application uses a weak password hash function, allowing an attacker to crack the weak password hash to gain access to an FTP user account.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
可逆的单向哈希
Source: NVD (National Vulnerability Database)
Vulnerability Title
SICK Field Analytics和SICK Media Server 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SICK Field Analytics和SICK Media Server都是德国SICK公司的产品。SICK Field Analytics是一款用于评估制造数据的软件。SICK Media Server是一款媒体服务器。 SICK Field Analytics和SICK Media Server存在安全漏洞,该漏洞源于使用弱密码哈希函数,可能导致密码被破解。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
SICK AGSICK Media Server 0 ~ 1.5 -

II. Public POCs for CVE-2025-49197

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-49197

登录查看更多情报信息。

Same Patch Batch · SICK AG · 2025-06-12 · 20 CVEs total

CVE-2025-491998.8 HIGHBackup files can be modified and uploaded
CVE-2025-491818.6 HIGHConfigurations endpoint does not require authorization
CVE-2025-491827.5 HIGHCredential disclosure
CVE-2025-491947.5 HIGHUnencrypted communication
CVE-2025-491837.5 HIGHUnencrypted communication (HTTP)
CVE-2025-491847.5 HIGHInformation disclosure to unauthorized user
CVE-2025-491966.5 MEDIUMDeprecated TLS version supported
CVE-2025-492006.5 MEDIUMUnencrypted backup contains sensitive information
CVE-2025-491855.5 MEDIUMStored Cross-Site-Script
CVE-2025-491895.3 MEDIUMCookie missing HttpOnly flag
CVE-2025-491885.3 MEDIUMSensitive Data in URL
CVE-2025-491875.3 MEDIUMUser enumeration
CVE-2025-491865.3 MEDIUMNo brute-force protection
CVE-2025-491955.3 MEDIUMNo protection against brute-force attacks
CVE-2025-491914.8 MEDIUMDashboards and iFrames can link malicious web content
CVE-2025-491904.3 MEDIUMServer-Side Request Forgery
CVE-2025-491924.3 MEDIUMClickjacking
CVE-2025-491934.2 MEDIUMMissing HTTP Security Headers
CVE-2025-491983.1 LOWPoor quality of randomness in authorization tokens

IV. Related Vulnerabilities

V. Comments for CVE-2025-49197

No comments yet


Leave a comment