Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2331: CWE-552 Files or Directories Accessible to External Parties in SICK AG SICK Lector85x

0
Critical
VulnerabilityCVE-2026-2331cvecve-2026-2331cwe-552
Published: Fri Mar 06 2026 (03/06/2026, 07:56:35 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: SICK Lector85x

Description

CVE-2026-2331 is a critical vulnerability in the SICK AG Lector85x device, version 2. 6. 0, allowing unauthenticated attackers to read and write sensitive filesystem areas via an exposed HTTP file access feature. This flaw arises from improper access restrictions in the AppEngine Fileaccess, exposing critical directories including device parameter files and custom application directories. Attackers can read and modify application settings, including customer-defined passwords, and potentially execute arbitrary Lua code within the sandboxed environment. The vulnerability has a CVSS score of 9. 8, indicating high impact on confidentiality, integrity, and availability without requiring authentication or user interaction. No known exploits are currently reported in the wild. Organizations using affected devices should urgently apply mitigations to prevent unauthorized access and code execution.

AI-Powered Analysis

AILast updated: 03/06/2026, 08:15:24 UTC

Technical Analysis

CVE-2026-2331 is a severe security vulnerability identified in the SICK AG Lector85x product, specifically version 2.6.0. The root cause is an improper access control flaw in the AppEngine Fileaccess feature, which exposes a critical filesystem directory over HTTP without requiring authentication. This exposure allows attackers to perform unauthenticated read and write operations on sensitive files, including device parameter files that contain configuration settings and customer-defined passwords. Furthermore, the vulnerability exposes the custom application directory, enabling attackers to upload or modify Lua scripts that the device executes within its sandboxed AppEngine environment. This capability can lead to arbitrary code execution, potentially allowing attackers to manipulate device behavior, disrupt operations, or pivot to other networked systems. The vulnerability is remotely exploitable over the network with no privileges or user interaction required, making it highly dangerous. The CVSS v3.1 base score of 9.8 reflects the critical nature of the flaw, with impacts spanning confidentiality, integrity, and availability. Although no public exploits have been reported yet, the ease of exploitation and the sensitive nature of the affected device functions make this a high-priority issue for affected organizations.

Potential Impact

The impact of CVE-2026-2331 is significant for organizations deploying the SICK Lector85x devices, which are commonly used in industrial automation and manufacturing environments for machine vision and quality control. Unauthorized read and write access to device configuration files can lead to exposure of sensitive credentials and operational parameters, compromising device integrity and confidentiality. The ability to execute arbitrary Lua code within the device's sandboxed environment can allow attackers to alter device behavior, disrupt production lines, or cause safety hazards. Additionally, compromised devices could serve as footholds for lateral movement within industrial networks, increasing the risk of broader operational technology (OT) environment compromise. Given the criticality of industrial control systems, such disruptions can result in financial losses, safety incidents, and reputational damage. The vulnerability’s remote and unauthenticated nature increases the likelihood of exploitation, especially in environments where devices are accessible over untrusted networks or insufficiently segmented.

Mitigation Recommendations

To mitigate CVE-2026-2331, organizations should immediately assess their deployment of SICK Lector85x devices and restrict network access to these devices, ensuring they are not exposed to untrusted networks or the internet. Network segmentation and firewall rules should be implemented to limit HTTP access to trusted management networks only. Since no official patches are currently available, organizations should contact SICK AG for guidance on firmware updates or workarounds. As a temporary measure, disabling or restricting the AppEngine Fileaccess HTTP feature, if configurable, can reduce exposure. Monitoring network traffic for unusual HTTP requests targeting the device’s file access endpoints can help detect exploitation attempts. Additionally, organizations should review and rotate any credentials stored on affected devices and audit device configurations for unauthorized changes. Implementing strict access controls and logging on management interfaces will further enhance detection and prevention capabilities. Finally, organizations should prepare to deploy vendor patches promptly once released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
SICK AG
Date Reserved
2026-02-11T09:33:16.256Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69aa89c1c48b3f10ff2e8a89

Added to database: 3/6/2026, 8:01:05 AM

Last enriched: 3/6/2026, 8:15:24 AM

Last updated: 3/6/2026, 3:10:27 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses