No analysis available yet.
Vendor Solution
Users are strongly recommended to upgrade to release version 2.8.0.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 09 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sick Ag
Sick Ag sick Lector83x Sick Ag sick Lector85x |
|
| Vendors & Products |
Sick Ag
Sick Ag sick Lector83x Sick Ag sick Lector85x |
Fri, 06 Mar 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTTP-based file access feature, allowing access without authentication. This includes device parameter files, enabling an attacker to read and modify application settings, including customer-defined passwords. Additionally, exposure of the custom application directory may allow execution of arbitrary Lua code within the sandboxed AppEngine environment. | |
| Title | CVE-2026-2331 | |
| Weaknesses | CWE-552 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2026-03-09T21:04:31.505Z
Reserved: 2026-02-11T09:33:16.256Z
Link: CVE-2026-2331
Updated: 2026-03-09T20:58:04.190Z
Status : Awaiting Analysis
Published: 2026-03-06T08:16:27.450
Modified: 2026-03-09T13:35:34.633
Link: CVE-2026-2331
No data.
OpenCVE Enrichment
Updated: 2026-03-09T10:08:10Z