Description
An attacker that gains SSH access to an unprivileged account may be able to disrupt services (including SSH), causing persistent loss of availability.
Problem types
CWE-770 Allocation of Resources Without Limits or Throttling
Product status
Any version before <7.1.1
>=7.1.1 (custom)
References
www.sick.com/...lines_cybersecurity_by_sick_en_im0106719.pdf
www.cisa.gov/...es-tools/resources/ics-recommended-practices
www.first.org/cvss/calculator/3.1
www.sick.com/.well-known/csaf/white/2025/sca-2025-0013.json
www.sick.com/.well-known/csaf/white/2025/sca-2025-0013.pdf