An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTTP-based file access feature, allowing access without authentication. This includes device parameter files, enabling an attacker to read and modify application settings, including customer-defined passwords. Additionally, exposure of the custom application directory may allow execution of arbitrary Lua code within the sandboxed AppEngine environment.
History

Fri, 06 Mar 2026 08:00:00 +0000

Type Values Removed Values Added
Description An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTTP-based file access feature, allowing access without authentication. This includes device parameter files, enabling an attacker to read and modify application settings, including customer-defined passwords. Additionally, exposure of the custom application directory may allow execution of arbitrary Lua code within the sandboxed AppEngine environment.
Title CVE-2026-2331
Weaknesses CWE-552
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published: 2026-03-06T07:56:35.445Z

Updated: 2026-03-06T07:56:35.445Z

Reserved: 2026-02-11T09:33:16.256Z

Link: CVE-2026-2331

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-06T08:16:27.450

Modified: 2026-03-06T08:16:27.450

Link: CVE-2026-2331

cve-icon Redhat

No data.