CVE-2025-27461

7.6 HIGH

📋 TL;DR

This vulnerability allows automatic login to the EPC2 Windows user account without password authentication during device startup. It affects industrial control systems and devices from SICK AG that use this default configuration, potentially exposing them to unauthorized access.

💻 Affected Systems

Products:
  • SICK AG industrial devices with EPC2 Windows user configuration
Versions: Specific versions not provided in CVE details
Operating Systems: Windows-based industrial control systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices configured with automatic EPC2 user login during startup. Industrial control systems in manufacturing, logistics, and automation sectors are particularly vulnerable.

📦 What is this software?

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains physical or remote access to the device, logs in as EPC2 user without credentials, and can execute arbitrary code, modify configurations, or disrupt industrial operations.

🟠

Likely Case

Unauthorized users with physical access or network connectivity can gain administrative privileges on affected devices, leading to configuration changes, data theft, or operational disruption.

🟢

If Mitigated

With proper network segmentation and physical security controls, the impact is limited to isolated systems with minimal operational disruption.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical access or network connectivity to the device. The automatic login feature eliminates authentication requirements.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://sick.com/psirt

Restart Required: Yes

Instructions:

1. Contact SICK AG PSIRT for specific remediation guidance. 2. Check vendor advisory for configuration updates. 3. Apply recommended security configurations. 4. Restart affected devices after changes.

🔧 Temporary Workarounds

Disable Automatic Login

windows

Configure device to require password authentication for EPC2 user during startup

Specific commands not provided - refer to SICK device documentation

Change Default Credentials

windows

Set strong, unique password for EPC2 user account

net user EPC2 <new_password>

🧯 If You Can't Patch

  • Implement strict physical access controls to prevent unauthorized device access
  • Segment affected devices on isolated networks with firewall rules blocking unnecessary connections

🔍 How to Verify

Check if Vulnerable:

Check if device automatically logs in EPC2 user without password prompt during startup. Review system configuration for automatic login settings.

Check Version:

Contact SICK AG for device-specific version checking procedures

Verify Fix Applied:

Verify that password authentication is required for EPC2 user login during device startup. Test login attempts without credentials.

📡 Detection & Monitoring

Log Indicators:

  • Successful EPC2 user logins without authentication attempts
  • Multiple failed login attempts followed by successful EPC2 login
  • Unusual login times or patterns for EPC2 account

Network Indicators:

  • Unexpected RDP or administrative protocol connections to affected devices
  • Network traffic from devices during non-operational hours

SIEM Query:

source="windows-security" EventID=4624 AccountName="EPC2" AuthenticationPackage="NTLM" | where !isnull(LogonType)

🔗 References

📤 Share & Export