Total
7 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2025-49182 | 1 Sick | 1 Media Server | 2026-01-29 | N/A | 7.5 HIGH |
| Files in the source code contain login credentials for the admin user and the property configuration password, allowing an attacker to get full access to the application. | |||||
| CVE-2025-49183 | 1 Sick | 1 Media Server | 2026-01-29 | N/A | 7.5 HIGH |
| All communication with the REST API is unencrypted (HTTP), allowing an attacker to intercept traffic between an actor and the webserver. This leads to the possibility of information gathering and downloading media files. | |||||
| CVE-2025-49193 | 1 Sick | 6 Baggage Analytics, Field Analytics, Logistic Diagnostic Analytics and 3 more | 2026-01-26 | N/A | 4.2 MEDIUM |
| The application fails to implement several security headers. These headers help increase the overall security level of the web application by e.g., preventing the application to be displayed in an iFrame (Clickjacking attacks) or not executing injected malicious JavaScript code (XSS attacks). | |||||
| CVE-2025-49194 | 1 Sick | 1 Media Server | 2026-01-26 | N/A | 7.5 HIGH |
| The server supports authentication methods in which credentials are sent in plaintext over unencrypted channels. If an attacker were to intercept traffic between a client and this server, the credentials would be exposed. | |||||
| CVE-2025-49195 | 1 Sick | 1 Media Server | 2026-01-26 | N/A | 5.3 MEDIUM |
| The FTP server’s login mechanism does not restrict authentication attempts, allowing an attacker to brute-force user passwords and potentially compromising the FTP server. | |||||
| CVE-2025-49197 | 1 Sick | 1 Media Server | 2026-01-26 | N/A | 6.5 MEDIUM |
| The application uses a weak password hash function, allowing an attacker to crack the weak password hash to gain access to an FTP user account. | |||||
| CVE-2025-49198 | 1 Sick | 1 Media Server | 2026-01-26 | N/A | 3.1 LOW |
| The Media Server’s authorization tokens have a poor quality of randomness. An attacker may be able to guess the token of an active user by computing plausible tokens. | |||||
