{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-22644","assignerOrgId":"a6863dd2-93fc-443d-bef1-79f0b5020988","state":"PUBLISHED","assignerShortName":"SICK AG","dateReserved":"2026-01-08T09:59:06.199Z","datePublished":"2026-01-15T13:14:13.694Z","dateUpdated":"2026-01-15T14:52:44.218Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"Incoming Goods Suite","vendor":"SICK AG","versions":[{"status":"affected","version":"all versions","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Certain requests pass the authentication token in the URL as string query parameter, making it vulnerable to theft through server logs, proxy logs and Referer headers, which could allow an attacker to hijack the user's session and gain unauthorized access.</p>"}],"value":"Certain requests pass the authentication token in the URL as string query parameter, making it vulnerable to theft through server logs, proxy logs and Referer headers, which could allow an attacker to hijack the user's session and gain unauthorized access."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","environmentalScore":5.3,"environmentalSeverity":"MEDIUM","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","temporalScore":5.3,"temporalSeverity":"MEDIUM","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-598","description":"CWE-598 Use of GET Request Method With Sensitive Query Strings","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"a6863dd2-93fc-443d-bef1-79f0b5020988","shortName":"SICK AG","dateUpdated":"2026-01-15T13:14:13.694Z"},"references":[{"tags":["x_SICK PSIRT Security Advisories"],"url":"https://sick.com/psirt"},{"tags":["x_SICK Operating Guidelines"],"url":"https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf"},{"tags":["x_ICS-CERT recommended practices on Industrial Security"],"url":"https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"},{"tags":["x_CVSS v3.1 Calculator"],"url":"https://www.first.org/cvss/calculator/3.1"},{"tags":["x_The canonical URL."],"url":"https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0002.json"},{"tags":["vendor-advisory"],"url":"https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0002.pdf"}],"source":{"advisory":"SCA-2026-0002","discovery":"INTERNAL"},"workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Please make sure that logs exclude informative level and are stored in a secure way.</p><p>For more information please follow the official Microsoft Security Considerations document for .NET:</p><p>https://learn.microsoft.com/en-us/aspnet/core/signalr/security?view=aspnetcore-9.0#access-token-logging</p><p>Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated</p><p>security risk. The collected resources ”SICK Operating Guidelines” and ”ICS-CERT recommended practices on Industrial Security” could help to implement the general security practices.</p>"}],"value":"Please make sure that logs exclude informative level and are stored in a secure way.\n\nFor more information please follow the official Microsoft Security Considerations document for .NET:\n\nhttps://learn.microsoft.com/en-us/aspnet/core/signalr/security?view=aspnetcore-9.0#access-token-logging\n\nPlease make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated\n\nsecurity risk. The collected resources ”SICK Operating Guidelines” and ”ICS-CERT recommended practices on Industrial Security” could help to implement the general security practices."}],"x_generator":{"engine":"csaf2cve 0.2.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-15T14:47:40.430864Z","id":"CVE-2026-22644","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-15T14:52:44.218Z"}}]}}