A remote unauthorized attacker may gather sensitive information of the application, due to missing authorization of configuration settings of the product.
| Software | From | Fixed in |
|---|---|---|
| sick / baggage_analytics | - | - |
| sick / enterprise_analytics | - | - |
| sick / field_analytics | - | - |
| sick / logistic_diagnostic_analytics | - | - |
| sick / package_analytics | - | - |
| sick / tire_analytics | - | - |