Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59460: CWE-1391 Use of Weak Credentials in SICK AG TLOC100-100 with Firmware <7.1.1

0
High
VulnerabilityCVE-2025-59460cvecve-2025-59460cwe-1391
Published: Mon Oct 27 2025 (10/27/2025, 10:10:31 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: TLOC100-100 with Firmware <7.1.1

Description

The system is deployed in its default state, with configuration settings that do not comply with the latest best practices for restricting access. This increases the risk of unauthorised connections.

AI-Powered Analysis

AILast updated: 11/03/2025, 11:21:05 UTC

Technical Analysis

CVE-2025-59460 is a vulnerability identified in the SICK AG TLOC100-100 industrial device series running firmware versions prior to 7.1.1. The root cause is the use of weak default credentials combined with configuration settings that do not align with current best practices for access control. This misconfiguration allows unauthorised remote attackers to establish connections to the device without requiring any authentication, user interaction, or privileges. The vulnerability primarily compromises confidentiality, as attackers can potentially access sensitive operational data or device information. The CVSS 3.1 score of 7.5 reflects the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), and no impact on integrity or availability (I:N/A:N). Although no exploits have been reported in the wild, the vulnerability poses a significant risk due to the widespread use of these devices in industrial automation and safety-critical environments. The lack of strong credential enforcement and secure default configurations increases the attack surface, making it easier for threat actors to gain unauthorised access. The vulnerability was publicly disclosed on October 27, 2025, with no official patches linked yet, but firmware version 7.1.1 or later is indicated as remediating the issue. Organizations relying on these devices should prioritize updating firmware and revising access control policies to mitigate potential exploitation.

Potential Impact

For European organizations, especially those in manufacturing, industrial automation, and critical infrastructure sectors, this vulnerability presents a significant risk to operational confidentiality. Unauthorized access could lead to exposure of sensitive process data, intellectual property, or safety system configurations. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach could facilitate further attacks or industrial espionage. Given the critical role of SICK AG devices in European industrial environments, exploitation could undermine trust in automation systems and cause regulatory compliance issues related to data protection. The ease of exploitation without authentication or user interaction increases the likelihood of opportunistic attacks, potentially by cybercriminals or state-sponsored actors targeting European industrial assets. The absence of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score underscores the urgency of addressing the vulnerability to prevent future incidents.

Mitigation Recommendations

1. Immediately upgrade all SICK AG TLOC100-100 devices to firmware version 7.1.1 or later, which addresses the weak credential issue. 2. Conduct a thorough audit of device configurations to ensure default credentials are replaced with strong, unique passwords following organizational password policies. 3. Implement network segmentation to isolate industrial control devices from general IT networks and restrict access to trusted management stations only. 4. Deploy strict access control lists (ACLs) and firewall rules to limit inbound connections to the devices from authorized IP addresses. 5. Enable logging and monitoring on devices and network segments to detect unauthorized access attempts promptly. 6. Incorporate multi-factor authentication (MFA) where supported to add an additional layer of security. 7. Educate operational technology (OT) personnel about the risks of default credentials and the importance of secure configurations. 8. Establish a vulnerability management process to track firmware updates and security advisories from SICK AG and respond swiftly to new threats. 9. Consider deploying intrusion detection/prevention systems (IDS/IPS) tailored for industrial protocols to detect anomalous activity targeting these devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SICK AG
Date Reserved
2025-09-16T13:38:29.663Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ff4972bbaf5d265c877175

Added to database: 10/27/2025, 10:29:06 AM

Last enriched: 11/3/2025, 11:21:05 AM

Last updated: 12/10/2025, 5:09:44 PM

Views: 167

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats