Unrated severityNVD Advisory· Published Mar 6, 2026· Updated Mar 9, 2026
CVE-2026-2331
CVE-2026-2331
Description
An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTTP-based file access feature, allowing access without authentication. This includes device parameter files, enabling an attacker to read and modify application settings, including customer-defined passwords. Additionally, exposure of the custom application directory may allow execution of arbitrary Lua code within the sandboxed AppEngine environment.
Affected products
2- SICK AG/SICK Lector83xv5Range: 2.6.0
- SICK AG/SICK Lector85xv5Range: 2.6.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- www.sick.com/.well-known/csaf/white/2026/sca-2026-0006.pdfmitrevendor-advisory
- www.cisa.gov/resources-tools/resources/ics-recommended-practicesmitrex_ICS-CERT recommended practices on Industrial Security
- www.first.org/cvss/calculator/3.1mitrex_CVSS v3.1 Calculator
- www.sick.com/.well-known/csaf/white/2026/sca-2026-0006.jsonmitrex_The canonical URL.
- www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdfmitrex_SICK Operating Guidelines
- www.sick.com/psirtmitrex_SICK PSIRT Security Advisories
News mentions
0No linked articles in our index yet.