CVE-2025-10561
Ubuntu version has reached the end of standard support
Description
Rejected reason: This CVE ID was assigned in error. The End-of-Life status of a component, by itself, does not constitute a vulnerability under the CVE Program’s rules. This condition represents a security weakness (CWE-1104: Use of Unmaintained Third-Party Components) rather than a specific vulnerability instance.
INFO
Published Date :
Oct. 27, 2025, 10:15 a.m.
Last Modified :
Nov. 11, 2025, 9:15 a.m.
Remotely Exploit :
Yes !
Source :
[email protected]
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | CRITICAL | a6863dd2-93fc-443d-bef1-79f0b5020988 | ||||
| CVSS 3.1 | CRITICAL | [email protected] | ||||
| CVSS 3.1 | CRITICAL | [email protected] |
Solution
- Update the operating system to the latest version.
- Apply all available security patches.
- Restart the device if prompted.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-10561 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2025-10561 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Rejected by [email protected]
Nov. 11, 2025
Action Type Old Value New Value -
CVE Modified by [email protected]
Nov. 11, 2025
Action Type Old Value New Value Changed Description The device is running an outdated operating system, which may be susceptible to known vulnerabilities. Rejected reason: This CVE ID was assigned in error. The End-of-Life status of a component, by itself, does not constitute a vulnerability under the CVE Program’s rules. This condition represents a security weakness (CWE-1104: Use of Unmaintained Third-Party Components) rather than a specific vulnerability instance. Removed CVSS V3.1 SICK AG: AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Removed CVSS V3.1 NIST: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Removed CWE SICK AG: CWE-1104 Removed CPE Configuration AND OR *cpe:2.3:o:sick:tloc100-100_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:sick:tloc100-100:-:*:*:*:*:*:*:* Removed Reference SICK AG: https://sick.com/psirt Removed Reference SICK AG: https://www.cisa.gov/resources-tools/resources/ics-recommended-practices Removed Reference SICK AG: https://www.first.org/cvss/calculator/3.1 Removed Reference SICK AG: https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0013.json Removed Reference SICK AG: https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0013.pdf Removed Reference SICK AG: https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf Removed Reference Type SICK AG: https://sick.com/psirt Types: Vendor Advisory Removed Reference Type SICK AG: https://www.cisa.gov/resources-tools/resources/ics-recommended-practices Types: US Government Resource Removed Reference Type SICK AG: https://www.first.org/cvss/calculator/3.1 Types: Not Applicable Removed Reference Type SICK AG: https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0013.json Types: Vendor Advisory Removed Reference Type SICK AG: https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0013.pdf Types: Vendor Advisory Removed Reference Type SICK AG: https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf Types: Product -
Initial Analysis by [email protected]
Nov. 04, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Added CPE Configuration AND OR *cpe:2.3:o:sick:tloc100-100_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:sick:tloc100-100:-:*:*:*:*:*:*:* Added Reference Type SICK AG: https://sick.com/psirt Types: Vendor Advisory Added Reference Type SICK AG: https://www.cisa.gov/resources-tools/resources/ics-recommended-practices Types: US Government Resource Added Reference Type SICK AG: https://www.first.org/cvss/calculator/3.1 Types: Not Applicable Added Reference Type SICK AG: https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0013.json Types: Vendor Advisory Added Reference Type SICK AG: https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0013.pdf Types: Vendor Advisory Added Reference Type SICK AG: https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf Types: Product -
New CVE Received by [email protected]
Oct. 27, 2025
Action Type Old Value New Value Added Description The device is running an outdated operating system, which may be susceptible to known vulnerabilities. Added CVSS V3.1 AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Added CWE CWE-1104 Added Reference https://sick.com/psirt Added Reference https://www.cisa.gov/resources-tools/resources/ics-recommended-practices Added Reference https://www.first.org/cvss/calculator/3.1 Added Reference https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0013.json Added Reference https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0013.pdf Added Reference https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf