The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device.
https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.pdf
https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0004.json