Sick Vulnerabilities
Comprehensive security vulnerability database for Sick products
1
1
2
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-1627 | 8.1 | An attacker can manipulate data being sent over the SSH connection by exploiting weak security methods in the device's firmware, but they need to be able to access the network traffic to do so. This means if they are on the same network, they could potentially alter the information exchanged between the device and other systems. | sicklms1000 firmware | Exploit Available | about 1 month agoFeb 27, 2026 |
About Sick Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Sick products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.