CVE-2025-282026.03.2025, 15:16An authenticated attacker can compromise the availability of the device via the networkEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST6.5 MEDIUMNETWORKLOWLOWCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HbizerbaCNA6.5 MEDIUMNETWORKLOWLOWCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HCISA-ADPADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 31%Common Weakness EnumerationCWE-400 - Uncontrolled Resource ConsumptionThe software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.Referenceshttps://www.bizerba.com/downloads/global/information-security/2025/bizerba-sa-2025-0002.pdf