Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources "SICK Operating Guidelines" and "ICS-CERT recommended practices on Industrial Security" could help to implement the general security practices.
Thu, 15 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 15 Jan 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker may exploit missing protection against clickjacking by tricking users into performing unintended actions through maliciously crafted web pages, leading to the extraction of sensitive data. | |
| Weaknesses | CWE-1021 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2026-01-15T14:36:41.215Z
Reserved: 2026-01-13T09:11:12.759Z
Link: CVE-2026-22918
Updated: 2026-01-15T14:36:36.655Z
Status : Received
Published: 2026-01-15T13:16:06.790
Modified: 2026-01-15T13:16:06.790
Link: CVE-2026-22918
No data.
OpenCVE Enrichment
No data.