{"vulnerability": "CVE-2025-27595", "sightings": [{"uuid": "0614ebe0-c4e6-44bd-94f7-354016b0b26d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27595", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkepn6l4f423", "content": "", "creation_timestamp": "2025-03-14T23:00:10.880862Z"}, {"uuid": "29675109-a469-49ae-9b53-5bbe6b3381e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27595", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114161097415646897", "content": "", "creation_timestamp": "2025-03-14T13:48:25.229237Z"}, {"uuid": "195ce426-8b88-44bb-abfe-1904843226f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27595", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkfxumxi2l23", "content": "", "creation_timestamp": "2025-03-15T11:00:09.260272Z"}, {"uuid": "61436616-f02b-478c-8387-ebc0135b74b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27595", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lkdqedxhph2g", "content": "", "creation_timestamp": "2025-03-14T13:40:25.474512Z"}, {"uuid": "fb362e10-0895-42d2-87cd-1c1be14740c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27595", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7552", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27595\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device.\n\ud83d\udccf Published: 2025-03-14T12:53:13.682Z\n\ud83d\udccf Modified: 2025-03-14T13:35:00.490Z\n\ud83d\udd17 References:\n1. https://sick.com/psirt\n2. https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF\n3. https://www.cisa.gov/resources-tools/resources/ics-recommended-practices\n4. https://www.first.org/cvss/calculator/3.1\n5. https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.pdf\n6. https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.json\n7. https://github.security.telekom.com/2025/03/multiple-vulnerabilities-in-sick-dl100.html", "creation_timestamp": "2025-03-14T13:47:27.000000Z"}, {"uuid": "fb03ad9f-8046-4ae4-abb8-5bac6c7b0d57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27595", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114161097329932334", "content": "", "creation_timestamp": "2025-03-14T13:48:24.187902Z"}, {"uuid": "401bcff5-b431-4e14-93a2-0a064f2a21f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27595", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkdra63u2r2h", "content": "", "creation_timestamp": "2025-03-14T13:55:59.986148Z"}, {"uuid": "00e11779-2d61-469b-98f3-b03776747983", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27595", "type": "seen", "source": "https://t.me/cvedetector/20307", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27595 - Cisco Device Weak Password Hash Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27595 \nPublished : March 14, 2025, 1:15 p.m. | 2\u00a0hours, 15\u00a0minutes ago \nDescription : The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-14T16:42:43.000000Z"}]}