Description
When an error occurs in the application a full stacktrace is provided to the user. The stacktrace lists class and method names as well as other internal information. An attacker thus receives information about the technology used and the structure of the application.
Problem types
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Product status
all versions
all versions
all versions
all versions
References
www.sick.com/...lines_cybersecurity_by_sick_en_im0106719.pdf
www.cisa.gov/...es-tools/resources/ics-recommended-practices
www.first.org/cvss/calculator/3.1
www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.json
www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.pdf