CVE-2025-1711
BaseFortify
Publication date: 2025-07-03
Last updated on: 2026-01-29
Assigner: SICK AG
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| endress | meac300-fnade4_firmware | to 0.16.0 (inc) |
| endress | meac300-fnade4 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1392 | The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality. |
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
If the reused credentials are compromised, an attacker could gain unauthorized access to multiple services or areas within the device, potentially leading to limited confidentiality loss. However, the impact is rated as low to moderate with no impact on integrity or availability.
Can you explain this vulnerability to me?
This vulnerability involves multiple services of the device under test (DUT) as well as different scopes of the same service reusing the same credentials. This means that the same username and password are used across various services or different parts of a service, which can increase the risk if those credentials are compromised.