Home

Description

An API endpoint allows arbitrary log entries to be created via POST request. Without sufficient validation of the input data, an attacker can create manipulated log entries and thus falsify or dilute logs, for example.

PUBLISHED Reserved 2025-09-03 | Published 2025-10-06 | Updated 2025-10-06 | Assigner SICK AG




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

Problem types

CWE-117 Improper Output Neutralization for Logs

Product status

Default status
affected

all versions
affected

References

sick.com/psirt

www.sick.com/...lines_cybersecurity_by_sick_en_im0106719.pdf

www.cisa.gov/...es-tools/resources/ics-recommended-practices

www.first.org/cvss/calculator/3.1

www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.json

www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.pdf vendor-advisory

cve.org (CVE-2025-58580)

nvd.nist.gov (CVE-2025-58580)

Download JSON