Home

Description

An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTTP-based file access feature, allowing access without authentication. This includes device parameter files, enabling an attacker to read and modify application settings, including customer-defined passwords. Additionally, exposure of the custom application directory may allow execution of arbitrary Lua code within the sandboxed AppEngine environment.

PUBLISHED Reserved 2026-02-11 | Published 2026-03-06 | Updated 2026-03-06 | Assigner SICK AG




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-552 Files or Directories Accessible to External Parties

Product status

Default status
affected

2.6.0 (custom)
affected

Default status
affected

2.6.0 (custom)
affected

References

www.sick.com/psirt

www.sick.com/...lines_cybersecurity_by_sick_en_im0106719.pdf

www.cisa.gov/...es-tools/resources/ics-recommended-practices

www.first.org/cvss/calculator/3.1

www.sick.com/.well-known/csaf/white/2026/sca-2026-0006.json

www.sick.com/.well-known/csaf/white/2026/sca-2026-0006.pdf vendor-advisory

cve.org (CVE-2026-2331)

nvd.nist.gov (CVE-2026-2331)

Download JSON