SCA-2026-0006

Vulnerability from csaf_sick - Published: 2026-03-06 14:00 - Updated: 2026-03-06 14:00
Summary
Vulnerabilities affecting SICK Lector85x and SICK Lector83x

Notes

summary
Two vulnerabilities affecting the SICK Lector85x and SICK Lector83x product families have been identified. Both vulnerabilities are caused by insufficient access restrictions in HTTP-based interfaces, which may allow unauthenticated access to sensitive device resources. Depending on the configuration, this could lead to unauthorized modification of device settings and security-relevant data. SICK recommends applying the defined remediations for both vulnerabilities. SICK is currently not aware of any public exploits.
General Security Measures
As general security measures, SICK recommends minimizing network exposure of the devices, restricting network access and following recommended security practices in order to run the devices in a protected IT environment.
Vulnerability Classification
SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer’s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.

{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "summary",
        "text": "Two vulnerabilities affecting the SICK Lector85x and SICK Lector83x product families have been identified. Both vulnerabilities are caused by insufficient access restrictions in HTTP-based interfaces, which may allow unauthenticated access to sensitive device resources. Depending on the configuration, this could lead to unauthorized modification of device settings and security-relevant data. SICK recommends applying the defined remediations for both vulnerabilities. SICK is currently not aware of any public exploits.",
        "title": "summary"
      },
      {
        "category": "general",
        "text": "As general security measures, SICK recommends minimizing network exposure of the devices, restricting network access and following recommended security practices in order to run the devices in a protected IT environment.",
        "title": "General Security Measures"
      },
      {
        "category": "general",
        "text": "SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer\u2019s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.",
        "title": "Vulnerability Classification"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "psirt@sick.de",
      "issuing_authority": "SICK AG issues and issues in EHS products (when related to the Endress+Hauser SICK (EHS) joint venture).",
      "name": "SICK PSIRT",
      "namespace": "https://www.sick.com/psirt"
    },
    "references": [
      {
        "summary": "SICK PSIRT Security Advisories",
        "url": "https://www.sick.com/psirt"
      },
      {
        "summary": "SICK Operating Guidelines",
        "url": "https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf"
      },
      {
        "summary": "ICS-CERT recommended practices on Industrial Security",
        "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
      },
      {
        "summary": "CVSS v3.1 Calculator",
        "url": "https://www.first.org/cvss/calculator/3.1"
      },
      {
        "category": "self",
        "summary": "The canonical URL.",
        "url": "https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0006.json"
      }
    ],
    "title": "Vulnerabilities affecting SICK Lector85x and SICK Lector83x",
    "tracking": {
      "current_release_date": "2026-03-06T14:00:00.000Z",
      "generator": {
        "date": "2026-02-20T08:10:03.757Z",
        "engine": {
          "name": "Secvisogram",
          "version": "2.5.43"
        }
      },
      "id": "SCA-2026-0006",
      "initial_release_date": "2026-03-06T14:00:00.000Z",
      "revision_history": [
        {
          "date": "2026-03-06T14:00:00.000Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:all/*",
                    "product": {
                      "name": "SICK Lector85x all versions",
                      "product_id": "CSAFPID-0001",
                      "product_identification_helper": {
                        "skus": [
                          "1123615",
                          "1130539",
                          "1130543",
                          "1134045",
                          "1134056",
                          "1134213",
                          "1134214",
                          "1134215",
                          "1134217",
                          "1134218",
                          "1134219",
                          "1134220",
                          "1134221",
                          "1134222",
                          "1134349",
                          "1134611",
                          "1134613",
                          "1134614",
                          "1137895",
                          "1138873",
                          "1139825",
                          "1140575",
                          "1142879",
                          "1142896",
                          "1143531",
                          "1143836",
                          "1144112",
                          "1144347",
                          "1144348",
                          "1144349",
                          "1144402",
                          "1144624",
                          "1145298",
                          "1145299",
                          "1146410",
                          "1146411",
                          "1147763",
                          "1148592",
                          "1149143",
                          "1151116",
                          "1151593",
                          "1152117",
                          "1152141",
                          "1152605",
                          "1152642",
                          "1153531",
                          "1153583",
                          "1154945",
                          "1155144",
                          "1155145",
                          "1155146",
                          "1155147",
                          "1155148",
                          "1155188",
                          "1155189",
                          "2144713"
                        ]
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Lector85x"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:all/*",
                    "product": {
                      "name": "SICK Lector83x all versions",
                      "product_id": "CSAFPID-0005",
                      "product_identification_helper": {
                        "skus": [
                          "1144813",
                          "1149549",
                          "1149550",
                          "1149568",
                          "1149569",
                          "1149570",
                          "1149571",
                          "1149572",
                          "1149573",
                          "1151785"
                        ]
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Lector83x"
              }
            ],
            "category": "product_family",
            "name": "Lector"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c 2.8.0",
                "product": {
                  "name": "SICK Lector85x firmware \u003c2.8.0",
                  "product_id": "CSAFPID-0002"
                }
              },
              {
                "category": "product_version",
                "name": "2.8.0",
                "product": {
                  "name": "SICK Lector85x firmware 2.8.0",
                  "product_id": "CSAFPID-0003"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003e= 2.6.0 \u003c= 2.7.0",
                "product": {
                  "name": "SICK Lector85x firmware \u003e= 2.6.0 \u003c= 2.7.0",
                  "product_id": "CSAFPID-0004"
                }
              }
            ],
            "category": "product_name",
            "name": "Lector85x firmware"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c 2.8.0",
                "product": {
                  "name": "SICK Lector83x firmware \u003c2.8.0",
                  "product_id": "CSAFPID-0006"
                }
              },
              {
                "category": "product_version",
                "name": "2.8.0",
                "product": {
                  "name": "SICK Lector83x firmware 2.8.0",
                  "product_id": "CSAFPID-0007"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003e= 2.6.0 \u003c= 2.7.0",
                "product": {
                  "name": "SICK Lector83x firmware \u003e= 2.6.0 \u003c= 2.7.0",
                  "product_id": "CSAFPID-0008"
                }
              }
            ],
            "category": "product_name",
            "name": "Lector83x firmware"
          }
        ],
        "category": "vendor",
        "name": "SICK AG"
      }
    ],
    "relationships": [
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK Lector85x with firmware \u003c 2.8.0",
          "product_id": "CSAFPID-0009"
        },
        "product_reference": "CSAFPID-0002",
        "relates_to_product_reference": "CSAFPID-0001"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK Lector85x with firmware 2.8",
          "product_id": "CSAFPID-0010"
        },
        "product_reference": "CSAFPID-0003",
        "relates_to_product_reference": "CSAFPID-0001"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK Lector85x with firmware \u003e= 2.6.0 \u003c= 2.7.0",
          "product_id": "CSAFPID-0011"
        },
        "product_reference": "CSAFPID-0004",
        "relates_to_product_reference": "CSAFPID-0001"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK Lector83x with firmware \u003c 2.8.0",
          "product_id": "CSAFPID-0012"
        },
        "product_reference": "CSAFPID-0006",
        "relates_to_product_reference": "CSAFPID-0005"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK Lector83x with firmware 2.8.0",
          "product_id": "CSAFPID-0013"
        },
        "product_reference": "CSAFPID-0007",
        "relates_to_product_reference": "CSAFPID-0005"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "SICK Lector83x with firmware \u003e= 2.6.0 \u003c= 2.7.0",
          "product_id": "CSAFPID-0014"
        },
        "product_reference": "CSAFPID-0008",
        "relates_to_product_reference": "CSAFPID-0005"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-2330",
      "cwe": {
        "id": "CWE-552",
        "name": "Files or Directories Accessible to External Parties"
      },
      "notes": [
        {
          "audience": "all",
          "category": "summary",
          "text": "An attacker may access restricted filesystem areas on the device via the CROWN REST interface due to incomplete whitelist enforcement. Certain directories intended for internal testing were not covered by the whitelist and are accessible without authentication. An unauthenticated attacker could place a manipulated parameter file that becomes active after a reboot, allowing modification of critical device settings, including network configuration and application parameters.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-0010",
          "CSAFPID-0013"
        ],
        "known_affected": [
          "CSAFPID-0009",
          "CSAFPID-0012"
        ],
        "recommended": [
          "CSAFPID-0013",
          "CSAFPID-0010"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Users are strongly recommended to upgrade to release version 2.8.0.",
          "product_ids": [
            "CSAFPID-0012",
            "CSAFPID-0009"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.4,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "LOW",
            "environmentalScore": 9.4,
            "environmentalSeverity": "CRITICAL",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 9.4,
            "temporalSeverity": "CRITICAL",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0009",
            "CSAFPID-0012"
          ]
        }
      ],
      "title": "CVE-2026-2330"
    },
    {
      "cve": "CVE-2026-2331",
      "cwe": {
        "id": "CWE-552",
        "name": "Files or Directories Accessible to External Parties"
      },
      "notes": [
        {
          "audience": "all",
          "category": "summary",
          "text": "An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTTP-based file access feature, allowing access without authentication. This includes device parameter files, enabling an attacker to read and modify application settings, including customer-defined passwords. Additionally, exposure of the custom application directory may allow execution of arbitrary Lua code within the sandboxed AppEngine environment.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-0013",
          "CSAFPID-0010"
        ],
        "known_affected": [
          "CSAFPID-0011",
          "CSAFPID-0014"
        ],
        "recommended": [
          "CSAFPID-0010",
          "CSAFPID-0013"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Users are strongly recommended to upgrade to release version 2.8.0.",
          "product_ids": [
            "CSAFPID-0014",
            "CSAFPID-0011"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "environmentalScore": 9.8,
            "environmentalSeverity": "CRITICAL",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 9.8,
            "temporalSeverity": "CRITICAL",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0011",
            "CSAFPID-0014"
          ]
        }
      ],
      "title": "CVE-2026-2331"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…