Sick Vulnerabilities
Comprehensive security vulnerability database for Sick products
2
1
2
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-1627 | 8.1 | An attacker can manipulate data being sent over the SSH connection by exploiting weak security methods in the device's firmware, but they need to be able to access the network traffic to do so. This means if they are on the same network, they could potentially alter the information exchanged between the device and other systems. | sicklms1000 firmware | Exploit Available | about 1 month agoFeb 27, 2026 |
| CVE-2026-1626 | 9.1 | An attacker can potentially eavesdrop on or alter the encrypted communication between the lms1000 device and other systems using its SSH service, but they need to be able to intercept the network traffic first. This is possible because the device uses weak encryption methods that can be exploited. | sicklms1000 firmware | Exploit Available | about 1 month agoFeb 27, 2026 |
About Sick Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Sick products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.