Vulnerabilities
Vulnerable Software
Sick:  Security Vulnerabilities
An attacker may exploit the use of outdated and weak MAC algorithms in the device’s SSH service to potentially compromise the integrity of the SSH session, allowing manipulation of transmitted data if the attacker can interact with the network traffic.
CVSS Score
6.5
EPSS Score
0.0
Published
2026-02-27
An attacker may exploit the use of weak CBC-based cipher suites in the device’s SSH service to potentially observe or manipulate parts of the encrypted SSH communication, if they are able to intercept or interact with the network traffic.
CVSS Score
6.5
EPSS Score
0.0
Published
2026-02-27
Certain requests pass the authentication token in the URL as string query parameter, making it vulnerable to theft through server logs, proxy logs and Referer headers, which could allow an attacker to hijack the user's session and gain unauthorized access.
CVSS Score
5.3
EPSS Score
0.0
Published
2026-01-15
The application discloses all used components, versions and license information to unauthenticated actors, giving attackers the opportunity to target known security vulnerabilities of used components.
CVSS Score
5.3
EPSS Score
0.0
Published
2026-01-15
Certain error messages returned by the application expose internal system details that should not be visible to end users, providing attackers with valuable reconnaissance information (like file paths, database errors, or software versions) that can be used to map the application's internal structure and discover other, more critical vulnerabilities.
CVSS Score
4.3
EPSS Score
0.0
Published
2026-01-15
The device's passwords have not been adequately salted, making them vulnerable to password extraction attacks.
CVSS Score
3.7
EPSS Score
0.0
Published
2026-01-15
Improper handling of a URL parameter may allow attackers to execute code in a user's browser after login. This can lead to the extraction of sensitive data.
CVSS Score
4.3
EPSS Score
0.0
Published
2026-01-15
An attacker with limited permissions may still be able to write files to specific locations on the device, potentially leading to system manipulation.
CVSS Score
4.3
EPSS Score
0.0
Published
2026-01-15
An attacker with low privileges may be able to read files from specific directories on the device, potentially exposing sensitive information.
CVSS Score
4.3
EPSS Score
0.0
Published
2026-01-15
An attacker with low privileges may be able to trigger critical system functions such as reboot or factory reset without proper restrictions, potentially leading to service disruption or loss of configuration.
CVSS Score
4.3
EPSS Score
0.0
Published
2026-01-15


Contact Us

Shodan ® - All rights reserved