CVE-2025-59460
BaseFortify
Publication date: 2025-10-27
Last updated on: 2025-11-03
Assigner: SICK AG
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sick | tloc100-100_firmware | to 7.1.1 (exc) |
| sick | tloc100-100 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1391 | The product uses weak credentials (such as a default key or hard-coded password) that can be calculated, derived, reused, or guessed by an attacker. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized connections to the system, potentially allowing attackers to access sensitive information or resources without permission. This can compromise confidentiality but does not affect integrity or availability according to the CVSS metrics.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should review and update the system's configuration settings to comply with the latest best practices for restricting access, thereby reducing the risk of unauthorized connections.
Can you explain this vulnerability to me?
This vulnerability arises because the system is deployed with default configuration settings that do not follow the latest best practices for restricting access. As a result, it increases the risk of unauthorized connections to the system.