CVE-2025-58590
📋 TL;DR
This vulnerability allows attackers to brute-force directory and file paths, potentially exposing sensitive information stored in accessible locations. It affects systems with insufficient access controls on file enumeration. Organizations using affected SICK products with internet-facing interfaces are particularly at risk.
💻 Affected Systems
- SICK products (specific models not detailed in provided references)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete exposure of all accessible files including configuration files, credentials, proprietary data, and sensitive operational information leading to full system compromise.
Likely Case
Partial information disclosure of accessible files and directories, potentially revealing system structure, configuration details, or limited sensitive data.
If Mitigated
Minimal impact with proper access controls, authentication requirements, and rate limiting preventing successful enumeration.
🎯 Exploit Status
Brute-force attacks require minimal technical skill - attackers can use automated tools to enumerate paths. No authentication bypass needed if interface is exposed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory SCA-2025-0010 for specific versions
Vendor Advisory: https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.json
Restart Required: Yes
Instructions:
1. Review SICK advisory SCA-2025-0010 2. Identify affected products 3. Apply vendor-provided patches 4. Restart affected systems 5. Verify patch application
🔧 Temporary Workarounds
Network Segmentation
allIsolate affected systems from untrusted networks using firewalls or VLANs
Access Control Lists
allImplement strict IP-based access controls to limit which systems can connect
Rate Limiting
allConfigure web servers or applications to limit requests per IP address
🧯 If You Can't Patch
- Implement network-level controls to restrict access to only trusted IP addresses
- Deploy web application firewalls (WAF) with path traversal and brute-force protection rules
🔍 How to Verify
Check if Vulnerable:
Test if directory/file enumeration is possible using tools like dirb, gobuster, or manual requests to common paths
Check Version:
Check system firmware/software version via SICK device interface or management console
Verify Fix Applied:
Attempt enumeration after patch - successful attempts should return proper access controls or error messages
📡 Detection & Monitoring
Log Indicators:
- Multiple 404/403 errors from same source
- Patterns of sequential path requests
- Unusual file access patterns
Network Indicators:
- High volume of HTTP requests to various paths
- Requests for common sensitive file names (config, backup, etc.)
SIEM Query:
source_ip=* AND (status_code=404 OR status_code=403) AND count() > 100 within 5 minutes
🔗 References
- https://sick.com/psirt
- https://www.cisa.gov/resources-tools/resources/ics-recommended-practices
- https://www.first.org/cvss/calculator/3.1
- https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.json
- https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.pdf
- https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf