CVE-2025-49183
Analyzed Analyzed - Analysis Complete
BaseFortify

Publication date: 2025-06-12

Last updated on: 2026-01-29

Assigner: SICK AG

Description
All communication with the REST API is unencrypted (HTTP), allowing an attacker to intercept traffic between an actor and the webserver. This leads to the possibility of information gathering and downloading media files.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-12
Last Modified
2026-01-29
Generated
2026-05-07
AI Q&A
2025-06-12
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sick media_server *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-319 The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs because all communication with the REST API is unencrypted, using HTTP instead of HTTPS. This allows an attacker to intercept the traffic between a user (actor) and the webserver, potentially capturing sensitive information and downloading media files.


How can this vulnerability impact me? :

The vulnerability can impact you by exposing sensitive information transmitted via the REST API to attackers who intercept the unencrypted traffic. This can lead to unauthorized information gathering and the downloading of media files without permission.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart