Sick Security Vulnerabilities (CVEs)

Track 55 security vulnerabilities affecting Sick products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

7 Critical
17 High
29 Medium
2 Low
🔔 Get Alerts for Sick
CVE-2026-22644 5.3

This vulnerability allows attackers to steal authentication tokens when they are passed in URL query parameters, potentially enabling session hijackin...

Jan 15, 2026
CVE-2026-22645 5.3

This vulnerability allows unauthenticated attackers to view detailed information about all software components, versions, and licenses used by the app...

Jan 15, 2026
CVE-2026-22646 4.3

This CVE describes an information disclosure vulnerability where error messages reveal internal system details like file paths, database errors, or so...

Jan 15, 2026
CVE-2026-22920 3.7

This vulnerability affects devices where passwords are stored without proper salting, allowing attackers to more easily extract and crack passwords th...

Jan 15, 2026
CVE-2026-22913 4.3

This vulnerability allows attackers to inject malicious scripts via URL parameters, which execute in authenticated users' browsers. This can lead to s...

Jan 15, 2026
CVE-2026-22914 4.3

This vulnerability allows attackers with limited permissions to write files to specific locations on affected devices, potentially enabling system man...

Jan 15, 2026
CVE-2026-22915 4.3

CVE-2026-22915 allows attackers with low privileges to read files from specific directories on affected devices, potentially exposing sensitive inform...

Jan 15, 2026
CVE-2026-22916 4.3

This vulnerability allows low-privileged attackers to trigger critical system functions like reboot or factory reset without proper authorization. It ...

Jan 15, 2026
CVE-2026-22917 4.3

This vulnerability involves improper input handling in a system endpoint that allows attackers to send crafted requests to overload resources, causing...

Jan 15, 2026
CVE-2026-22918 4.3

This CVE describes a clickjacking vulnerability where attackers can trick users into performing unintended actions on web interfaces, potentially lead...

Jan 15, 2026
CVE-2026-22919 3.8

This vulnerability allows attackers with administrative access to inject malicious scripts into the login page, enabling cross-site scripting (XSS) at...

Jan 15, 2026
CVE-2026-22907 9.9

This critical vulnerability allows attackers to bypass security controls and access the host filesystem, enabling unauthorized reading and modificatio...

Jan 15, 2026
CVE-2026-22908 9.1

This vulnerability allows remote attackers to gain full system access by uploading unvalidated container images to affected systems. It compromises bo...

Jan 15, 2026
CVE-2026-22909 7.5

This vulnerability allows unauthorized access to system functions that control installed applications. Attackers can start, stop, or delete applicatio...

Jan 15, 2026
CVE-2026-22910 7.5

This vulnerability allows attackers to gain unauthorized access to affected devices by using weak, publicly known default passwords on hidden user acc...

Jan 15, 2026
CVE-2026-22911 5.3

This vulnerability exposes password hashes for system accounts within firmware update files. Remote attackers could recover credentials and gain unaut...

Jan 15, 2026
CVE-2026-22912 4.3

This vulnerability allows attackers to redirect authenticated users to malicious websites through improper validation of a login parameter. It affects...

Jan 15, 2026
CVE-2025-59462 6.5

This vulnerability allows an attacker to crash the UpdateService by tampering with the C++ CLI client during file transfers, disrupting update functio...

Oct 27, 2025
CVE-2025-59463 4.3

This vulnerability allows attackers to cause chunk-size mismatches during file transfers, blocking current transfers and preventing subsequent ones. I...

Oct 27, 2025
CVE-2025-59459 5.5

An attacker with SSH access to an unprivileged account can disrupt services including SSH itself, causing persistent denial of service. This affects s...

Oct 27, 2025
CVE-2025-59460 7.5

This vulnerability affects systems deployed with default configurations that don't follow security best practices for access restrictions. It allows u...

Oct 27, 2025
CVE-2025-58591 6.5

This vulnerability allows remote attackers to brute-force directory and file paths to access sensitive information like private keys and configuration...

Oct 6, 2025
CVE-2025-9914 4.3

This vulnerability allows attackers to use stored user credentials from the local database to gain unauthorized access to affected systems. It affects...

Oct 6, 2025
CVE-2025-58584 5.3

This vulnerability exposes authentication credentials transmitted via URL parameters, which can be unintentionally stored in server logs, browser hist...

Oct 6, 2025
CVE-2025-58586 5.3

This vulnerability allows attackers to enumerate valid usernames by observing different error messages for incorrect passwords versus non-existent use...

Oct 6, 2025
CVE-2025-58587 6.5

This vulnerability allows attackers to perform brute-force attacks against authentication systems by attempting multiple login attempts without rate l...

Oct 6, 2025
CVE-2025-58590 6.5

This vulnerability allows attackers to brute-force directory and file paths, potentially exposing sensitive information stored in accessible locations...

Oct 6, 2025
CVE-2025-58579 5.3

This vulnerability allows unauthenticated attackers to query an endpoint without proper authentication, enabling user enumeration attacks. It affects ...

Oct 6, 2025
CVE-2025-58580 6.5

This vulnerability allows attackers to create arbitrary log entries via an unvalidated API endpoint. Attackers can falsify or dilute logs, compromisin...

Oct 6, 2025
CVE-2025-58582 5.3

This vulnerability allows attackers to send excessively large payloads during failed login attempts, which are then logged without validation. This co...

Oct 6, 2025
CVE-2025-49199 8.8

This vulnerability allows attackers to modify unsigned backup ZIP files and re-upload them to disrupt application functionality. Attackers can reconfi...

Jun 12, 2025
CVE-2025-49192 4.3

This clickjacking vulnerability allows attackers to embed the vulnerable web application in an invisible frame and trick users into clicking malicious...

Jun 12, 2025
CVE-2025-49194 7.5

This vulnerability allows attackers to intercept unencrypted network traffic and steal authentication credentials from affected servers. It affects sy...

Jun 12, 2025
CVE-2025-49196 6.5

This vulnerability involves a service supporting deprecated and unsafe TLS versions, potentially allowing attackers to intercept or manipulate sensiti...

Jun 12, 2025
CVE-2025-49189 5.3

This vulnerability involves a session cookie named '@@' being configured without the HttpOnly flag, making it accessible to client-side scripts. This ...

Jun 12, 2025
CVE-2025-49187 5.3

This vulnerability allows attackers to enumerate valid usernames by observing different error messages for incorrect passwords versus non-existent use...

Jun 12, 2025
CVE-2025-49190 4.3

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in SICK industrial automation products. An attacker can exploit an endpoint to m...

Jun 12, 2025
CVE-2025-49181 8.6

This vulnerability allows unauthorized users to access sensitive information via HTTP GET requests and modify critical service configurations via HTTP...

Jun 12, 2025
CVE-2025-49183 7.5

This vulnerability exposes REST API communications to interception by using unencrypted HTTP instead of HTTPS. Attackers can eavesdrop on traffic betw...

Jun 12, 2025
CVE-2025-49185 5.5

This cross-site scripting (XSS) vulnerability allows attackers who can create dashboard widgets to inject malicious JavaScript into Transform Function...

Jun 12, 2025
CVE-2023-5246 8.8

This vulnerability allows unauthenticated remote attackers to bypass authentication on SICK Flexi Soft Gateways by capturing and replaying authenticat...

Oct 23, 2023
CVE-2023-43698 7.1

This is a cross-site scripting (XSS) vulnerability in SICK APU's RDT400 component that allows an unprivileged remote attacker to inject malicious scri...

Oct 9, 2023
CVE-2023-43696 8.2

This vulnerability allows unauthenticated remote attackers to download and upload arbitrary files via anonymous FTP access to SICK APU devices. It aff...

Oct 9, 2023
CVE-2023-43700 7.7

CVE-2023-43700 is a missing authorization vulnerability in SICK APU's RDT400 component that allows unauthenticated remote attackers to modify data via...

Oct 9, 2023
CVE-2023-5288 9.8

This vulnerability allows remote unauthorized attackers to connect to SICK SIM1012 devices, change configuration settings, reset the device, or upload...

Sep 29, 2023
CVE-2023-3270 8.6

CVE-2023-3270 is an information disclosure vulnerability in the SICK ICR890-4 industrial camera system, allowing unauthenticated remote attackers to a...

Jul 10, 2023
CVE-2023-3272 7.5

This vulnerability in SICK ICR890-4 industrial cameras allows attackers to intercept unencrypted network traffic containing sensitive information. Any...

Jul 10, 2023
CVE-2023-35696 7.5

Unauthenticated HTTP endpoints in SICK ICR890-4 industrial cameras allow remote attackers to retrieve sensitive device information without credentials...

Jul 10, 2023
CVE-2023-31410 9.8

CVE-2023-31410 is a critical vulnerability in SICK EventCam App where communications lack TLS encryption, allowing attackers to intercept and manipula...

Jun 19, 2023
CVE-2023-23446 7.5

This vulnerability allows unprivileged remote attackers to download files from SICK FTMg AIR FLOW SENSOR devices via the REST interface using low-priv...

May 15, 2023

Why Monitor Sick Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 55+ known vulnerabilities affecting Sick products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Sick packages in under 60 seconds. No agents required - completely agentless scanning that works across Sick deployments.

Free vulnerability database: Access detailed information about every Sick CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Sick CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Sick CVEs Free