{"vulnerability": "CVE-2025-0867", "sightings": [{"uuid": "a3743361-62ec-4033-8c9f-ff07b69b0bce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0867", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4869", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0867\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: The standard user uses the run as function to start the MEAC applications with administrative privileges. To ensure that the system can startup on its own, the credentials of the administrator were stored. Consequently, the EPC2 user can execute any command with administrative privileges. This allows a privilege escalation to the administrative level.\n\ud83d\udccf Published: 2025-02-14T12:37:09.250Z\n\ud83d\udccf Modified: 2025-02-21T09:57:54.831Z\n\ud83d\udd17 References:\n1. https://sick.com/psirt\n2. https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF\n3. https://www.cisa.gov/resources-tools/resources/ics-recommended-practices\n4. https://www.first.org/cvss/calculator/3.1\n5. https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0001.pdf\n6. https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0001.json", "creation_timestamp": "2025-02-21T10:20:16.000000Z"}, {"uuid": "c9a0b254-869e-47ba-8c70-a1ab45513f8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0867", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114002321891252776", "content": "", "creation_timestamp": "2025-02-14T12:49:42.970300Z"}, {"uuid": "7e61ae42-7226-4159-87ad-3325168648ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0867", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114002337449684066", "content": "", "creation_timestamp": "2025-02-14T12:53:40.303232Z"}, {"uuid": "5d24ed81-5a1c-499a-86c0-a0a1ffea4716", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0867", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li5bx5kem62p", "content": "", "creation_timestamp": "2025-02-14T13:16:08.142168Z"}, {"uuid": "2c05865c-24dc-495e-b632-884944b4c791", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0867", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lpicxy6hxa23", "content": "", "creation_timestamp": "2025-05-19T00:30:08.791853Z"}, {"uuid": "268e03cc-5b66-4891-b654-cf7e9aaa6ac3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0867", "type": "seen", "source": "Telegram/Qo-izfDWhDayCXtIZNeYDyFdlOUwLPt2Ga1PrdRpP9yUMQAY", "content": "", "creation_timestamp": "2025-02-14T21:08:29.000000Z"}, {"uuid": "a0ee2817-22d9-458f-8148-8d1c2bdb983a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0867", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114002789826373730", "content": "", "creation_timestamp": "2025-02-14T14:48:44.047806Z"}, {"uuid": "a0b8ff9d-6672-4466-8571-c776b270a888", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0867", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li5jp5tivl22", "content": "", "creation_timestamp": "2025-02-14T15:34:50.090207Z"}, {"uuid": "c748080a-7ece-46c2-9873-38c501749ae7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0867", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li6fww2k5k2w", "content": "", "creation_timestamp": "2025-02-15T00:00:18.751914Z"}, {"uuid": "0809606d-f585-4cfa-8ee0-77c30c5795b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0867", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li7o653whz2w", "content": "", "creation_timestamp": "2025-02-15T12:00:07.854917Z"}, {"uuid": "e4eb85a6-e156-4018-b286-c8d89df53837", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0867", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lilj4dqaos2i", "content": "", "creation_timestamp": "2025-02-20T05:01:39.154898Z"}, {"uuid": "33c399f9-f629-4575-b07f-272eb3346185", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0867", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lilj6p2d5l2g", "content": "", "creation_timestamp": "2025-02-20T05:02:54.491530Z"}, {"uuid": "939e859a-efc6-479d-843b-23fac30ee650", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0867", "type": "seen", "source": "https://t.me/CyberBulletin/2360", "content": "\u26a1SICK Warns of Severe Security Flaws in MEAC300 Sensors \u2013 CVE-2025-0867 Rated 9.9 CVSS.\n\n#CyberBulletin", "creation_timestamp": "2025-02-20T11:16:08.000000Z"}]}