Due to a lack of authentication, it is possible for an unauthenticated user to request data from this endpoint, making the application vulnerable for user enumeration.
https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.pdf
https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0010.json
https://www.first.org/cvss/calculator/3.1
https://www.cisa.gov/resources-tools/resources/ics-recommended-practices