We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
The backup ZIPs are not signed by the application, leading to the possibility that an attacker can download a backup ZIP, modify and re-upload it. This allows the attacker to disrupt the application by configuring the services in a way that they are unable to run, making the application unusable. They can redirect traffic that is meant to be internal to their own hosted services and gathering information.
Reserved 2025-06-03 | Published 2025-06-12 | Updated 2025-06-13 | Assigner SICK AGCWE-345 Insufficient Verification of Data Authenticity
cdn.sick.com/...ation_CYBERSECURITY_BY_SICK_en_IM0084411.PDF
www.cisa.gov/...es-tools/resources/ics-recommended-practices
www.first.org/cvss/calculator/3.1
www.sick.com/.well-known/csaf/white/2025/sca-2025-0007.pdf
www.sick.com/.well-known/csaf/white/2025/sca-2025-0007.json
Support options