Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59463: CWE-833 Deadlock in SICK AG TLOC100-100 all Firmware versions

0
Medium
VulnerabilityCVE-2025-59463cvecve-2025-59463cwe-833
Published: Mon Oct 27 2025 (10/27/2025, 10:14:31 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: TLOC100-100 all Firmware versions

Description

An attacker may cause chunk-size mismatches that block file transfers and prevent subsequent transfers.

AI-Powered Analysis

AILast updated: 11/03/2025, 11:22:08 UTC

Technical Analysis

CVE-2025-59463 is a vulnerability classified under CWE-833 (Deadlock) affecting all firmware versions of the SICK AG TLOC100-100 device. The issue arises when an attacker induces chunk-size mismatches during file transfer operations, causing the device to enter a deadlock state. This deadlock blocks the current file transfer and prevents any subsequent transfers from proceeding, effectively causing a denial of service (DoS) condition. The vulnerability does not compromise confidentiality or integrity but impacts availability by halting critical file transfer operations. The CVSS 3.1 base score is 4.3, reflecting a medium severity primarily due to the remote attack vector (AV:A - adjacent network), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), and only availability is affected (A:L). No authentication is required, making it easier for an attacker with network access to exploit. Currently, there are no known exploits in the wild, and no patches have been published by SICK AG. The vulnerability is particularly relevant for industrial environments where TLOC100-100 devices are used for automation and control, as disruption of file transfers can impact operational continuity.

Potential Impact

For European organizations, particularly those in manufacturing, logistics, and industrial automation sectors using SICK AG TLOC100-100 devices, this vulnerability can cause operational disruptions by blocking firmware or configuration file transfers. This denial of service may delay maintenance, updates, or data synchronization, potentially leading to downtime or degraded system performance. While it does not allow data theft or manipulation, the inability to perform timely updates or transfers could indirectly affect system reliability and safety. Organizations relying on these devices for critical infrastructure or production lines may face increased operational risk and potential financial losses due to halted processes. The medium CVSS score reflects moderate risk, but the impact could be more significant in environments where continuous availability is essential.

Mitigation Recommendations

Since no patches are currently available, organizations should implement network segmentation to restrict access to the TLOC100-100 devices, limiting exposure to adjacent network attackers. Monitoring file transfer operations for anomalies such as repeated failures or stalls can provide early warning of exploitation attempts. Employ strict access controls and network-level filtering to prevent unauthorized entities from initiating file transfers. Engage with SICK AG for updates and apply firmware patches promptly once released. Additionally, consider implementing redundant systems or fallback procedures to maintain operations during potential service disruptions. Document and rehearse incident response plans specific to availability issues caused by this vulnerability to minimize downtime.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SICK AG
Date Reserved
2025-09-16T13:38:29.663Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ff4972bbaf5d265c87718d

Added to database: 10/27/2025, 10:29:06 AM

Last enriched: 11/3/2025, 11:22:08 AM

Last updated: 12/10/2025, 11:49:27 PM

Views: 157

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats