Vulnerabilities (CVE)

Filtered by vendor Sick Subscribe
Filtered by product Media Server
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-49182 1 Sick 1 Media Server 2026-01-29 N/A 7.5 HIGH
Files in the source code contain login credentials for the admin user and the property configuration password, allowing an attacker to get full access to the application.
CVE-2025-49183 1 Sick 1 Media Server 2026-01-29 N/A 7.5 HIGH
All communication with the REST API is unencrypted (HTTP), allowing an attacker to intercept traffic between an actor and the webserver. This leads to the possibility of information gathering and downloading media files.
CVE-2025-49193 1 Sick 6 Baggage Analytics, Field Analytics, Logistic Diagnostic Analytics and 3 more 2026-01-26 N/A 4.2 MEDIUM
The application fails to implement several security headers. These headers help increase the overall security level of the web application by e.g., preventing the application to be displayed in an iFrame (Clickjacking attacks) or not executing injected malicious JavaScript code (XSS attacks).
CVE-2025-49194 1 Sick 1 Media Server 2026-01-26 N/A 7.5 HIGH
The server supports authentication methods in which credentials are sent in plaintext over unencrypted channels. If an attacker were to intercept traffic between a client and this server, the credentials would be exposed.
CVE-2025-49195 1 Sick 1 Media Server 2026-01-26 N/A 5.3 MEDIUM
The FTP server’s login mechanism does not restrict authentication attempts, allowing an attacker to brute-force user passwords and potentially compromising the FTP server.
CVE-2025-49197 1 Sick 1 Media Server 2026-01-26 N/A 6.5 MEDIUM
The application uses a weak password hash function, allowing an attacker to crack the weak password hash to gain access to an FTP user account.
CVE-2025-49198 1 Sick 1 Media Server 2026-01-26 N/A 3.1 LOW
The Media Server’s authorization tokens have a poor quality of randomness. An attacker may be able to guess the token of an active user by computing plausible tokens.