Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59459: CWE-770 Allocation of Resources Without Limits or Throttling in SICK AG TLOC100-100 with Firmware <7.1.1

0
Medium
VulnerabilityCVE-2025-59459cvecve-2025-59459cwe-770
Published: Mon Oct 27 2025 (10/27/2025, 10:09:03 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: TLOC100-100 with Firmware <7.1.1

Description

An attacker that gains SSH access to an unprivileged account may be able to disrupt services (including SSH), causing persistent loss of availability.

AI-Powered Analysis

AILast updated: 10/27/2025, 10:44:57 UTC

Technical Analysis

CVE-2025-59459 is a vulnerability classified under CWE-770, which involves the allocation of resources without proper limits or throttling, in the SICK AG TLOC100-100 industrial device firmware versions prior to 7.1.1. This flaw allows an attacker who has gained SSH access to an unprivileged account on the device to consume resources excessively, leading to disruption of critical services including SSH itself. The vulnerability does not require user interaction and has a low attack complexity, but it does require the attacker to have some level of authenticated access (low privileges). The consequence is a persistent denial of service (DoS) condition that impacts availability but does not compromise confidentiality or integrity of the system. The lack of resource management means that an attacker can cause the device to become unresponsive or fail to provide its intended operational functions. Although no exploits are currently known in the wild, the vulnerability poses a risk to industrial environments relying on these devices for automation and control. The CVSS v3.1 score of 5.5 reflects a medium severity, primarily due to the impact on availability and the requirement for authenticated access. The vulnerability was publicly disclosed in October 2025, with no patch links currently provided, indicating the need for vigilance and interim mitigations until firmware updates are available.

Potential Impact

For European organizations, especially those in manufacturing, logistics, and industrial automation sectors that utilize SICK AG TLOC100-100 devices, this vulnerability poses a significant risk to operational continuity. Disruption of services including SSH can prevent remote management and monitoring, potentially leading to prolonged downtime and loss of productivity. Persistent denial of availability may affect safety systems, production lines, or critical infrastructure components, causing financial losses and operational delays. The impact is heightened in environments where these devices are integrated into larger industrial control systems (ICS) or supervisory control and data acquisition (SCADA) networks. Additionally, the inability to remotely access devices due to service disruption complicates incident response and recovery efforts. Given the industrial nature of the affected product, the threat extends beyond IT systems to physical processes, increasing the potential for safety hazards or regulatory non-compliance. European organizations must consider these operational risks and prioritize mitigation to maintain service availability and safety standards.

Mitigation Recommendations

1. Upgrade the firmware of all SICK AG TLOC100-100 devices to version 7.1.1 or later as soon as the patch becomes available from the vendor. 2. Restrict SSH access to these devices by implementing strict access control lists (ACLs) and limiting connections to trusted IP addresses or management networks. 3. Employ network segmentation to isolate industrial devices from general IT networks, reducing the attack surface and limiting lateral movement. 4. Monitor device resource usage and SSH session activity for anomalies that could indicate exploitation attempts, using industrial network monitoring tools. 5. Implement multi-factor authentication (MFA) for SSH access where supported to increase the difficulty of unauthorized access. 6. Establish incident response procedures specific to industrial device availability issues to enable rapid detection and recovery. 7. Conduct regular security audits and penetration testing focused on industrial control systems to identify and remediate similar vulnerabilities proactively. 8. Collaborate with SICK AG support channels to obtain timely updates and security advisories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SICK AG
Date Reserved
2025-09-16T13:38:29.663Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ff4972bbaf5d265c87716d

Added to database: 10/27/2025, 10:29:06 AM

Last enriched: 10/27/2025, 10:44:57 AM

Last updated: 10/27/2025, 11:45:19 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats