{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-22646","assignerOrgId":"a6863dd2-93fc-443d-bef1-79f0b5020988","state":"PUBLISHED","assignerShortName":"SICK AG","dateReserved":"2026-01-08T09:59:06.199Z","datePublished":"2026-01-15T13:15:01.194Z","dateUpdated":"2026-01-15T14:35:40.263Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"Incoming Goods Suite","vendor":"SICK AG","versions":[{"lessThan":"1.2.1","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Certain error messages returned by the application expose internal system details that should not be visible to end users, providing attackers with valuable reconnaissance information (like file paths, database errors, or software versions) that can be used to map the application's internal structure and discover other, more critical vulnerabilities.</p>"}],"value":"Certain error messages returned by the application expose internal system details that should not be visible to end users, providing attackers with valuable reconnaissance information (like file paths, database errors, or software versions) that can be used to map the application's internal structure and discover other, more critical vulnerabilities."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","environmentalScore":4.3,"environmentalSeverity":"MEDIUM","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","temporalScore":4.3,"temporalSeverity":"MEDIUM","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-209","description":"CWE-209 Generation of Error Message Containing Sensitive Information","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"a6863dd2-93fc-443d-bef1-79f0b5020988","shortName":"SICK AG","dateUpdated":"2026-01-15T13:15:01.194Z"},"references":[{"tags":["x_SICK PSIRT Security Advisories"],"url":"https://sick.com/psirt"},{"tags":["x_SICK Operating Guidelines"],"url":"https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf"},{"tags":["x_ICS-CERT recommended practices on Industrial Security"],"url":"https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"},{"tags":["x_CVSS v3.1 Calculator"],"url":"https://www.first.org/cvss/calculator/3.1"},{"tags":["x_The canonical URL."],"url":"https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0002.json"},{"tags":["vendor-advisory"],"url":"https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0002.pdf"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Users are strongly recommended to upgrade to the latest release of Incoming Goods Suite (&gt;= 1.2.1).</p>"}],"value":"Users are strongly recommended to upgrade to the latest release of Incoming Goods Suite (>= 1.2.1)."}],"source":{"advisory":"SCA-2026-0002","discovery":"INTERNAL"},"x_generator":{"engine":"csaf2cve 0.2.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-15T14:35:14.803887Z","id":"CVE-2026-22646","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-15T14:35:40.263Z"}}]}}