The application is vulnerable to cross-site request forgery. An attacker can trick a valid, logged in user into submitting a web request that they did not intend. The request uses the victim's browser's saved authorization to execute the request.
https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf
https://sick.com/psirt
https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json
https://www.first.org/cvss/calculator/3.1
https://www.endress.com
https://www.cisa.gov/resources-tools/resources/ics-recommended-practices
Source: Mitre, NVD
Published: 2025-07-03
Updated: 2025-07-03
Base Score: 5
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N
Severity: Medium
Base Score: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
EPSS: 0.00034