Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58582: CWE-770 Allocation of Resources Without Limits or Throttling in SICK AG Enterprise Analytics

0
Medium
VulnerabilityCVE-2025-58582cvecve-2025-58582cwe-770
Published: Mon Oct 06 2025 (10/06/2025, 06:50:56 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: Enterprise Analytics

Description

If a user tries to login but the provided credentials are incorrect a log is created. The data for this POST requests is not validated and it’s possible to send giant payloads which are then logged.

AI-Powered Analysis

AILast updated: 10/06/2025, 07:10:48 UTC

Technical Analysis

CVE-2025-58582 is a vulnerability classified under CWE-770, which involves allocation of resources without proper limits or throttling. The issue exists in SICK AG's Enterprise Analytics product across all versions. When a user attempts to log in with incorrect credentials, the system logs the POST request data. However, the application fails to validate or limit the size of this data, allowing an attacker to send extremely large payloads. These oversized payloads are then logged, potentially consuming excessive disk space, memory, or CPU resources. This can degrade system performance or cause denial of service conditions by exhausting logging infrastructure or related resources. The vulnerability is remotely exploitable without authentication or user interaction, as it occurs during login attempts. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, no privileges required, no user interaction, and impact limited to availability (no confidentiality or integrity impact). No patches or known exploits have been reported at the time of publication. This vulnerability highlights the importance of input validation and resource management in logging mechanisms to prevent resource exhaustion attacks.

Potential Impact

For European organizations deploying SICK AG's Enterprise Analytics, this vulnerability poses a risk of denial of service through resource exhaustion. Attackers can remotely send large payloads during failed login attempts, causing excessive logging and potential system slowdown or crashes. This can disrupt analytics operations critical for industrial automation, manufacturing, or logistics sectors where SICK products are commonly used. The impact is primarily on availability, potentially leading to downtime or degraded service quality. While no direct confidentiality or integrity compromise is indicated, operational disruptions can have cascading effects on business processes and safety monitoring. Organizations with high reliance on SICK analytics for real-time decision-making or compliance reporting may face significant operational risks. Additionally, the lack of authentication requirement broadens the attack surface, allowing external threat actors to exploit the vulnerability without insider access.

Mitigation Recommendations

To mitigate CVE-2025-58582, organizations should implement strict input validation on all login-related POST requests to enforce size limits on payloads before logging. Configuring logging systems to impose maximum log entry sizes and employing log rotation and archival policies can prevent resource exhaustion. Network-level protections such as rate limiting and web application firewalls (WAFs) can help detect and block abnormal login attempts with oversized payloads. Monitoring logs for unusual patterns of failed login attempts with large payloads can provide early warning of exploitation attempts. If possible, update or patch the SICK Enterprise Analytics product once vendor fixes become available. Until patches are released, consider isolating the affected service or limiting access to trusted networks. Regularly review and test logging infrastructure capacity and resilience to ensure it can handle unexpected input volumes without impacting system availability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SICK AG
Date Reserved
2025-09-03T08:58:14.355Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e369cfbd6176610b49caa6

Added to database: 10/6/2025, 7:03:43 AM

Last enriched: 10/6/2025, 7:10:48 AM

Last updated: 11/22/2025, 3:21:28 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats