An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTTP-based file access feature, allowing access without authentication. This includes device parameter files, enabling an attacker to read and modify application settings, including customer-defined passwords. Additionally, exposure of the custom application directory may allow execution of arbitrary Lua code within the sandboxed AppEngine environment.
Advisories

No advisories yet.

Fixes

Solution

Users are strongly recommended to upgrade to release version 2.8.0.


Workaround

No workaround given by the vendor.

History

Fri, 06 Mar 2026 08:00:00 +0000

Type Values Removed Values Added
Description An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTTP-based file access feature, allowing access without authentication. This includes device parameter files, enabling an attacker to read and modify application settings, including customer-defined passwords. Additionally, exposure of the custom application directory may allow execution of arbitrary Lua code within the sandboxed AppEngine environment.
Title CVE-2026-2331
Weaknesses CWE-552
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2026-03-06T07:56:35.445Z

Reserved: 2026-02-11T09:33:16.256Z

Link: CVE-2026-2331

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-06T08:16:27.450

Modified: 2026-03-06T08:16:27.450

Link: CVE-2026-2331

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses