An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTTP-based file access feature, allowing access without authentication. This includes device parameter files, enabling an attacker to read and modify application settings, including customer-defined passwords. Additionally, exposure of the custom application directory may allow execution of arbitrary Lua code within the sandboxed AppEngine environment.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
Users are strongly recommended to upgrade to release version 2.8.0.
Workaround
No workaround given by the vendor.
References
History
Fri, 06 Mar 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTTP-based file access feature, allowing access without authentication. This includes device parameter files, enabling an attacker to read and modify application settings, including customer-defined passwords. Additionally, exposure of the custom application directory may allow execution of arbitrary Lua code within the sandboxed AppEngine environment. | |
| Title | CVE-2026-2331 | |
| Weaknesses | CWE-552 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2026-03-06T07:56:35.445Z
Reserved: 2026-02-11T09:33:16.256Z
Link: CVE-2026-2331
No data.
Status : Received
Published: 2026-03-06T08:16:27.450
Modified: 2026-03-06T08:16:27.450
Link: CVE-2026-2331
No data.
OpenCVE Enrichment
No data.
Weaknesses