The application fails to implement several security headers. These headers help increase the overall security level of the web application by e.g., preventing the application to be displayed in an iFrame (Clickjacking attacks) or not executing injected malicious JavaScript code (XSS attacks).
References
| Link | Resource |
|---|---|
| https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF | Broken Link |
| https://sick.com/psirt | Vendor Advisory |
| https://www.cisa.gov/resources-tools/resources/ics-recommended-practices | US Government Resource |
| https://www.first.org/cvss/calculator/3.1 | Not Applicable |
| https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0007.json | Vendor Advisory |
| https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0007.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-06-12 15:15
Updated : 2026-01-26 19:30
NVD link : CVE-2025-49193
Mitre link : CVE-2025-49193
CVE.ORG link : CVE-2025-49193
JSON object : View
Products Affected
sick
- field_analytics
- baggage_analytics
- media_server
- logistic_diagnostic_analytics
- package_analytics
- tire_analytics
CWE
CWE-693
Protection Mechanism Failure
