This could allow a remote attacker to access arbitrary files on the device.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 12 May 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Siemens
Siemens ros |
|
| Vendors & Products |
Siemens
Siemens ros |
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Path Traversal Allowing Remote File Read in Siemens ROS# |
Tue, 12 May 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been identified in ROS# (All versions < V2.2.2). Affected versions contain a path traversal vulnerability because user input is not properly sanitized. This could allow a remote attacker to access arbitrary files on the device. | |
| Weaknesses | CWE-23 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2026-05-12T08:21:18.261Z
Reserved: 2026-04-21T08:01:09.876Z
Link: CVE-2026-41551
No data.
Status : Received
Published: 2026-05-12T10:16:46.277
Modified: 2026-05-12T10:16:46.277
Link: CVE-2026-41551
No data.
OpenCVE Enrichment
Updated: 2026-05-12T12:30:15Z