Description
The credentials of the users stored in the system's local database can be used for the log in, making it possible for an attacker to gain unauthorized access. This could potentially affect the confidentiality of the application.
Problem types
CWE-288 Authentication Bypass Using an Alternate Path or Channel
Product status
all versions
all versions
all versions
all versions
References
www.sick.com/...lines_cybersecurity_by_sick_en_im0106719.pdf
www.cisa.gov/...es-tools/resources/ics-recommended-practices
www.first.org/cvss/calculator/3.1
www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.json
www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.pdf