CVE-2025-49199
Analyzed Analyzed - Analysis Complete
BaseFortify

Publication date: 2025-06-12

Last updated on: 2026-01-26

Assigner: SICK AG

Description
The backup ZIPs are not signed by the application, leading to the possibility that an attacker can download a backup ZIP, modify and re-upload it. This allows the attacker to disrupt the application by configuring the services in a way that they are unable to run, making the application unusable. They can redirect traffic that is meant to be internal to their own hosted services and gathering information.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-12
Last Modified
2026-01-26
Generated
2026-05-07
AI Q&A
2025-06-12
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sick field_analytics *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-345 The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs because backup ZIP files created by the application are not signed. An attacker can download a backup ZIP, modify its contents, and then re-upload it. This manipulation allows the attacker to change the application's service configurations, potentially causing the services to fail to run and making the application unusable. Additionally, the attacker can redirect internal traffic to their own hosted services to gather information.


How can this vulnerability impact me? :

The vulnerability can severely impact you by making the application unusable due to disrupted service configurations. It also allows an attacker to redirect internal traffic to their own services, which can lead to unauthorized information gathering and potential data breaches.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart