Sick Sick

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Sick product.

RSS Feeds for Sick security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Sick products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Sick Sorted by Most Security Vulnerabilities since 2018

Sick Tloc100 1006 vulnerabilities

Sick Sopas Engineering Tool3 vulnerabilities

Sick Eventcam App2 vulnerabilities

Sick Flexi Soft Designer1 vulnerability

Sick Ftmg1 vulnerability

Sick Safety Designer1 vulnerability

Sick Sim1000 Fx Firmware1 vulnerability

Sick Sim2000 Firmware1 vulnerability

Sick Sim2000st Firmware1 vulnerability

Sick Tim3xx1 vulnerability

By the Year

In 2026 there have been 30 vulnerabilities in Sick with an average score of 5.9 out of ten. Last year, in 2025 Sick had 24 security vulnerabilities published. That is, 6 more vulnerabilities have already been reported in 2026 as compared to last year. However, the average CVE base score of the vulnerabilities in 2026 is greater by 0.44.




Year Vulnerabilities Average Score
2026 30 5.90
2025 24 5.47
2024 1 8.80
2023 2 8.60
2022 9 8.31
2021 3 8.23

It may take a day or so for new Sick vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Sick Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2026-2331 Mar 06, 2026
AppEngine HTTP FileAccess Unauth R/W Enables Config File Leak An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTTP-based file access feature, allowing access without authentication. This includes device parameter files, enabling an attacker to read and modify application settings, including customer-defined passwords. Additionally, exposure of the custom application directory may allow execution of arbitrary Lua code within the sandboxed AppEngine environment.
CVE-2026-2330 Mar 06, 2026
SICK CROWN REST interface fails whitelist arbitrary filesystem access An attacker may access restricted filesystem areas on the device via the CROWN REST interface due to incomplete whitelist enforcement. Certain directories intended for internal testing were not covered by the whitelist and are accessible without authentication. An unauthenticated attacker could place a manipulated parameter file that becomes active after a reboot, allowing modification of critical device settings, including network configuration and application parameters.
CVE-2026-1627 Feb 27, 2026
SICK AG Device SSH Weak MAC Exploit An attacker may exploit the use of outdated and weak MAC algorithms in the devices SSH service to potentially compromise the integrity of the SSH session, allowing manipulation of transmitted data if the attacker can interact with the network traffic.
CVE-2026-1626 Feb 27, 2026
Weak CBC Cipher Suites in SICK AG SSH Service Enable Eavesdropping An attacker may exploit the use of weak CBC-based cipher suites in the devices SSH service to potentially observe or manipulate parts of the encrypted SSH communication, if they are able to intercept or interact with the network traffic.
CVE-2026-22646 Jan 15, 2026
SICK AG: Error Message Info Leakage Enables Reconnaissance Certain error messages returned by the application expose internal system details that should not be visible to end users, providing attackers with valuable reconnaissance information (like file paths, database errors, or software versions) that can be used to map the application's internal structure and discover other, more critical vulnerabilities.
CVE-2026-22645 Jan 15, 2026
SICK AG App Leaks Component Versions to Unauth Actors The application discloses all used components, versions and license information to unauthenticated actors, giving attackers the opportunity to target known security vulnerabilities of used components.
CVE-2026-22644 Jan 15, 2026
Auth Token Exposure via URL Query in SICK AG Web App Certain requests pass the authentication token in the URL as string query parameter, making it vulnerable to theft through server logs, proxy logs and Referer headers, which could allow an attacker to hijack the user's session and gain unauthorized access.
CVE-2026-22643 Jan 15, 2026
CVE-2026-22643
CVE-2026-22642 Jan 15, 2026
CVE-2026-22642
CVE-2026-22641 Jan 15, 2026
CVE-2026-22641
CVE-2026-22640 Jan 15, 2026
CVE-2026-22640
CVE-2026-22639 Jan 15, 2026
CVE-2026-22639
CVE-2026-22638 Jan 15, 2026
CVE-2026-22638
CVE-2026-22637 Jan 15, 2026
CVE-2026-22637
CVE-2026-0713 Jan 15, 2026
CVE-2026-0713
CVE-2026-0712 Jan 15, 2026
CVE-2026-0712
CVE-2026-22920 Jan 15, 2026
SICK AG Device Password Salting Flaw (CVE-2026-22920) The device's passwords have not been adequately salted, making them vulnerable to password extraction attacks.
CVE-2026-22919 Jan 15, 2026
SICK AG: XSS via Admin-Injected Login Page Content An attacker with administrative access may inject malicious content into the login page, potentially enabling cross-site scripting (XSS) attacks, leading to the extraction of sensitive data.
CVE-2026-22918 Jan 15, 2026
SICK AG Web UI Clickjacking (CVE-2026-22918) An attacker may exploit missing protection against clickjacking by tricking users into performing unintended actions through maliciously crafted web pages, leading to the extraction of sensitive data.
CVE-2026-22917 Jan 15, 2026
SICK AG DDOS via Improper Input in System Endpoint Improper input handling in a system endpoint may allow attackers to overload resources, causing a denial of service.
CVE-2026-22916 Jan 15, 2026
SICK AG Device: Low-Privilege Reboot/Factory Reset Exploit An attacker with low privileges may be able to trigger critical system functions such as reboot or factory reset without proper restrictions, potentially leading to service disruption or loss of configuration.
CVE-2026-22915 Jan 15, 2026
SICK AG device LFR via low-privilege (CVE-2026-22915) An attacker with low privileges may be able to read files from specific directories on the device, potentially exposing sensitive information.
CVE-2026-22914 Jan 15, 2026
Limited-Perm Attack Lets Write Files on SICK AG IoT Device An attacker with limited permissions may still be able to write files to specific locations on the device, potentially leading to system manipulation.
CVE-2026-22913 Jan 15, 2026
SICK iPort XSS via URL Parameter Improper handling of a URL parameter may allow attackers to execute code in a user's browser after login. This can lead to the extraction of sensitive data.
CVE-2026-22912 Jan 15, 2026
SICK AG login param redirect leads to phishing post-auth Improper validation of a login parameter may allow attackers to redirect users to malicious websites after authentication. This can lead to various risk including stealing credentials from unsuspecting users.
CVE-2026-22911 Jan 15, 2026
Firmware Update Exposes Password Hashes - Remote Credential Theft CVE-2026-22911 Firmware update files may expose password hashes for system accounts, which could allow a remote attacker to recover credentials and gain unauthorized access to the device.
CVE-2026-22910 Jan 15, 2026
SICK AG Device Exposes Hidden User Levels via Default Passwords The device is deployed with weak and publicly known default passwords for certain hidden user levels, increasing the risk of unauthorized access. This represents a high risk to the integrity of the system.
CVE-2026-22909 Jan 15, 2026
SICK AG Unauthorized Access Enables App Control on Safety Controllers Certain system functions may be accessed without proper authorization, allowing attackers to start, stop, or delete installed applications, potentially disrupting system operations.
CVE-2026-22908 Jan 15, 2026
Unvalidated Container Image Upload Allows RCE in SICK AG Software Uploading unvalidated container images may allow remote attackers to gain full access to the system, potentially compromising its integrity and confidentiality.
CVE-2026-22907 Jan 15, 2026
SICK AG: Host FS Access vuln (CVE-2026-22907) An attacker may gain unauthorized access to the host filesystem, potentially allowing them to read and modify system data.
CVE-2025-59463 Oct 27, 2025
Chunk-Size Mismatch in File Transfer Causes Transfer Failure An attacker may cause chunk-size mismatches that block file transfers and prevent subsequent transfers.
Tloc100 100
CVE-2025-59462 Oct 27, 2025
C++ CLI tampering crashes UpdateService, disrupting updates An attacker who tampers with the C++ CLI client may crash the UpdateService during file transfers, disrupting updates and availability.
Tloc100 100
CVE-2025-59461 Oct 27, 2025
Remote unauthenticated access via C++ API A remote unauthenticated attacker may use the unauthenticated C++ API to access or modify sensitive data and disrupt services.
Tloc100 100
CVE-2025-59460 Oct 27, 2025
Unknown Product Default Config Enables Unauthorised Connections The system is deployed in its default state, with configuration settings that do not comply with the latest best practices for restricting access. This increases the risk of unauthorised connections.
Tloc100 100
CVE-2025-59459 Oct 27, 2025
OpenSSH unprivileged account allows persistent SSH/Service DoS An attacker that gains SSH access to an unprivileged account may be able to disrupt services (including SSH), causing persistent loss of availability.
Tloc100 100
CVE-2025-10561 Oct 27, 2025
Outdated OS Vulnerability on Unknown Device
Tloc100 100
CVE-2025-58579 Oct 06, 2025
Unauthenticated Endpoint Enables User Enumeration Due to a lack of authentication, it is possible for an unauthenticated user to request data from this endpoint, making the application vulnerable for user enumeration.
CVE-2025-58591 Oct 06, 2025
Remote Brute Force FOF Disclosure for Private Keys A remote, unauthorized attacker can brute force folders and files and read them like private keys or configurations, making the application vulnerable for gathering sensitive information.
CVE-2025-58590 Oct 06, 2025
Directory Listing Brute-Force Vulnerability (CVE-2025-58590) It's possible to brute force folders and files, what can be used by an attacker to steal sensitve information.
CVE-2025-58589 Oct 06, 2025
Stacktrace Disclosure Reveals Class & Method Names When an error occurs in the application a full stacktrace is provided to the user. The stacktrace lists class and method names as well as other internal information. An attacker thus receives information about the technology used and the structure of the application.
CVE-2025-58587 Oct 06, 2025
Unknown Product: Brute-Force Attacks via Missing Auth Throttling The application does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it possible for an attacker to guess user credentials.
CVE-2025-58586 Oct 06, 2025
Username Enumeration via ErrMsg in Login Auth System For failed login attempts, the application returns different error messages depending on whether the login failed due to an incorrect password or a non-existing username. This allows an attacker to guess usernames until they find an existing one.
CVE-2025-58585 Oct 06, 2025
Auth Bypass: Unauth Endpoints Leak Sensitive Info Multiple endpoints with sensitive information do not require authentication, making the application susceptible to information gathering.
CVE-2025-58584 Oct 06, 2025
CVE-2025-58584: Credentials in URL Leak via Logs In the HTTP request, the username and password are transferred directly in the URL as parameters. However, URLs can be stored in various systems such as server logs, browser histories or proxy servers. As a result, there is a high risk that this sensitive data will be disclosed unintentionally.
CVE-2025-58583 Oct 06, 2025
Unauth H2 DB Access via Prefilled Username The application provides access to a login protected H2 database for caching purposes. The username is prefilled.
CVE-2025-58582 Oct 06, 2025
Large-Size Unvalidated POST Trigger Log Injection DoS (CVE-2025-58582) If a user tries to login but the provided credentials are incorrect a log is created. The data for this POST requests is not validated and its possible to send giant payloads which are then logged.
CVE-2025-58581 Oct 06, 2025
Info Exposure: Stacktrace Leak in Java App When an error occurs in the application a full stacktrace is provided to the user. The stacktrace lists class and method names as well as other internal information. An attacker can thus obtain information about the technology used and the structure of the application.
CVE-2025-58580 Oct 06, 2025
API POST Endpoint Enabling Arbitrary Log Entry Injection An API endpoint allows arbitrary log entries to be created via POST request. Without sufficient validation of the input data, an attacker can create manipulated log entries and thus falsify or dilute logs, for example.
CVE-2025-58578 Oct 06, 2025
Unrestricted User Account Creation via API Endpoint (CVE-2025-58578) A user with the appropriate authorization can create any number of user accounts via an API endpoint using a POST request. There are no quotas, checking mechanisms or restrictions to limit the creation.
CVE-2025-9914 Oct 06, 2025
Local DB Credential Leak Enables Unauthorized Access The credentials of the users stored in the system's local database can be used for the log in, making it possible for an attacker to gain unauthorized access. This could potentially affect the confidentiality of the application.
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.