Skip to main content

CVE-2025-49189: CWE-1004 Sensitive Cookie Without 'HttpOnly' Flag in SICK AG SICK Media Server

Medium
VulnerabilityCVE-2025-49189cvecve-2025-49189cwe-1004
Published: Thu Jun 12 2025 (06/12/2025, 14:03:39 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: SICK Media Server

Description

The HttpOnlyflag of the session cookie \"@@\" is set to false. Since this flag helps preventing access to cookies via client-side scripts, setting the flag to false can lead to a higher possibility of Cross-Side-Scripting attacks which target the stored cookies.

AI-Powered Analysis

AILast updated: 06/12/2025, 14:39:02 UTC

Technical Analysis

CVE-2025-49189 is a medium-severity vulnerability identified in the SICK Media Server product developed by SICK AG. The vulnerability arises from the improper configuration of the session cookie named "@@", where the HttpOnly flag is set to false. The HttpOnly attribute is a security feature that prevents client-side scripts, such as JavaScript, from accessing cookies. When this flag is not set, it increases the risk that malicious scripts injected via Cross-Site Scripting (XSS) attacks can access session cookies. Although this vulnerability does not directly enable code execution or privilege escalation, it exposes session cookies to theft, which can lead to session hijacking and unauthorized access to user sessions. The CVSS 3.1 base score is 5.3, reflecting a medium severity level, with the vector indicating that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), and no user interaction (UI:N). The impact is limited to confidentiality (C:L) with no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been published yet. The affected version is listed as "0", which likely indicates an initial or default version of the product. The vulnerability is categorized under CWE-1004, which relates to sensitive cookies without the HttpOnly flag, a common web security misconfiguration that can facilitate cookie theft via XSS attacks. Given the nature of the vulnerability, it is primarily a web application security issue that can be exploited by attackers who can inject or lure users into executing malicious scripts within the context of the SICK Media Server web interface or related web applications.

Potential Impact

For European organizations using the SICK Media Server, this vulnerability poses a risk of session cookie theft through client-side script exploitation. If an attacker successfully exploits this vulnerability, they could hijack user sessions, potentially gaining unauthorized access to the media server's management interface or sensitive operational data. This could lead to unauthorized monitoring, manipulation, or disruption of industrial processes controlled or monitored by the media server. Given that SICK AG is a prominent supplier of industrial automation and sensor solutions widely used in manufacturing, logistics, and process industries across Europe, the confidentiality breach could have operational security implications. However, since the vulnerability does not affect integrity or availability directly, the risk of system downtime or data manipulation is lower. The lack of required user interaction and low attack complexity means that attackers could exploit this vulnerability remotely without needing credentials or user involvement, increasing the threat surface. Organizations in sectors such as manufacturing, automotive, pharmaceuticals, and critical infrastructure that rely on SICK Media Server for industrial monitoring and control could face increased risks of espionage or operational disruption if attackers leverage stolen session cookies to gain persistent access.

Mitigation Recommendations

1. Immediate mitigation should focus on configuring the SICK Media Server to set the HttpOnly flag on all sensitive cookies, especially session cookies. This can often be done by updating the web server or application configuration to enforce HttpOnly attributes. 2. Implement Content Security Policy (CSP) headers to reduce the risk of XSS attacks by restricting the sources of executable scripts. 3. Conduct thorough input validation and output encoding on all user inputs and outputs to prevent injection of malicious scripts. 4. Monitor web application logs for unusual activities indicative of attempted XSS or session hijacking. 5. Restrict access to the media server management interface to trusted networks and use VPNs or other secure access methods. 6. Employ multi-factor authentication (MFA) for accessing the media server to reduce the impact of stolen session cookies. 7. Regularly update and patch the SICK Media Server software once the vendor releases a fix addressing this vulnerability. 8. Educate users and administrators about phishing and social engineering tactics that could facilitate XSS exploitation. 9. Use web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting the media server. These steps go beyond generic advice by focusing on specific configurations and layered defenses tailored to the SICK Media Server environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SICK AG
Date Reserved
2025-06-03T05:55:52.772Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684ae2e2358c65714e6a8738

Added to database: 6/12/2025, 2:23:30 PM

Last enriched: 6/12/2025, 2:39:02 PM

Last updated: 8/15/2025, 1:35:18 AM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats