CVE-2026-2331

critical

Description

An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTTP-based file access feature, allowing access without authentication. This includes device parameter files, enabling an attacker to read and modify application settings, including customer-defined passwords. Additionally, exposure of the custom application directory may allow execution of arbitrary Lua code within the sandboxed AppEngine environment.

References

https://www.sick.com/psirt

https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf

https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0006.pdf

https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0006.json

https://www.first.org/cvss/calculator/3.1

https://www.cisa.gov/resources-tools/resources/ics-recommended-practices

Details

Source: Mitre, NVD

Published: 2026-03-06

Updated: 2026-03-09

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical

EPSS

EPSS: 0.00167