Description
Certain error messages returned by the application expose internal system details that should not be visible to end users, providing attackers with valuable reconnaissance information (like file paths, database errors, or software versions) that can be used to map the application's internal structure and discover other, more critical vulnerabilities.
Published: 2026-01-15
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Immediate Patch
AI Analysis

Impact

The vulnerability stems from the application returning detailed error messages that expose internal system information such as file paths, database error details, and software version identifiers. This information disclosure gives an attacker or an uninformed user valuable reconnaissance data that can be used to map the application's internal structure and identify additional, more critical weaknesses. The direct impact is a breach of confidentiality, providing attackers with knowledge that could facilitate subsequent attacks.

Affected Systems

SICK AG Incoming Goods Suite is affected. Specific affected versions are not listed; any installation that exposes detailed error messages in its user interface is considered vulnerable. Users running older releases prior to the recommended 1.2.1 patch should verify whether their deployments generate informative error output.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity, and the EPSS score of less than 1% reflects a very low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote via the exposed web or application interface, though a local attack could also trigger the detailed error messages if mishandling inputs. Overall, the risk profile is moderate with a low exploitation probability, but the informational value to an attacker warrants prompt mitigation.

Generated by OpenCVE AI on April 18, 2026 at 06:07 UTC.

Remediation

Vendor Solution

Users are strongly recommended to upgrade to the latest release of Incoming Goods Suite (>= 1.2.1).


OpenCVE Recommended Actions

  • Upgrade to Incoming Goods Suite 1.2.1 or later
  • Configure the application to suppress detailed error messages in user-facing responses
  • Restrict access to error logs so that only privileged users can view them

Generated by OpenCVE AI on April 18, 2026 at 06:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 06:30:00 +0000

Type Values Removed Values Added
Title Error Messages Reveal Sensitive System Details

Thu, 29 Jan 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Sick
Sick incoming Goods Suite
CPEs cpe:2.3:a:sick:incoming_goods_suite:*:*:*:*:*:*:*:*
Vendors & Products Sick
Sick incoming Goods Suite

Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Sick Ag
Sick Ag incoming Goods Suite
Vendors & Products Sick Ag
Sick Ag incoming Goods Suite

Thu, 15 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 Jan 2026 13:45:00 +0000

Type Values Removed Values Added
Description Certain error messages returned by the application expose internal system details that should not be visible to end users, providing attackers with valuable reconnaissance information (like file paths, database errors, or software versions) that can be used to map the application's internal structure and discover other, more critical vulnerabilities.
Weaknesses CWE-209
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Sick Incoming Goods Suite
Sick Ag Incoming Goods Suite
cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2026-01-15T14:35:40.263Z

Reserved: 2026-01-08T09:59:06.199Z

Link: CVE-2026-22646

cve-icon Vulnrichment

Updated: 2026-01-15T14:35:33.792Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-15T14:16:28.430

Modified: 2026-01-29T16:18:21.980

Link: CVE-2026-22646

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T06:15:15Z

Weaknesses