The device is deployed with weak and publicly known default passwords for certain hidden user levels, increasing the risk of unauthorized access. This represents a high risk to the integrity of the system.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
Upon completion of the initial device setup, deactivate AppEngine. Disabling it fully mitigates this vulnerability.
References
History
Thu, 15 Jan 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The device is deployed with weak and publicly known default passwords for certain hidden user levels, increasing the risk of unauthorized access. This represents a high risk to the integrity of the system. | |
| Weaknesses | CWE-1391 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2026-01-15T14:40:17.107Z
Reserved: 2026-01-13T09:11:11.447Z
Link: CVE-2026-22910
No data.
Status : Received
Published: 2026-01-15T13:16:05.673
Modified: 2026-01-15T13:16:05.673
Link: CVE-2026-22910
No data.
OpenCVE Enrichment
No data.
Weaknesses