Metrics
Affected Vendors & Products
No advisories yet.
Solution
Users are strongly recommended to upgrade to release version 2.8.0.
Workaround
No workaround given by the vendor.
Mon, 09 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sick Ag
Sick Ag sick Lector83x Sick Ag sick Lector85x |
|
| Vendors & Products |
Sick Ag
Sick Ag sick Lector83x Sick Ag sick Lector85x |
Fri, 06 Mar 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker may access restricted filesystem areas on the device via the CROWN REST interface due to incomplete whitelist enforcement. Certain directories intended for internal testing were not covered by the whitelist and are accessible without authentication. An unauthenticated attacker could place a manipulated parameter file that becomes active after a reboot, allowing modification of critical device settings, including network configuration and application parameters. | |
| Title | CVE-2026-2330 | |
| Weaknesses | CWE-552 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2026-03-09T21:04:31.663Z
Reserved: 2026-02-11T09:33:15.947Z
Link: CVE-2026-2330
Updated: 2026-03-09T20:58:06.423Z
Status : Awaiting Analysis
Published: 2026-03-06T08:16:27.253
Modified: 2026-03-09T13:35:34.633
Link: CVE-2026-2330
No data.
OpenCVE Enrichment
Updated: 2026-03-09T10:08:23Z