Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0713: CWE-863 Incorrect Authorization in SICK AG Incoming Goods Suite

0
High
VulnerabilityCVE-2026-0713cvecve-2026-0713cwe-863
Published: Thu Jan 15 2026 (01/15/2026, 13:10:37 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: Incoming Goods Suite

Description

A security vulnerability in the /apis/dashboard.grafana.app/* endpoints allows authenticated users to bypass dashboard and folder permissions. The vulnerability affects all API versions (v0alpha1, v1alpha1, v2alpha1). Impact: - Viewers can view all dashboards/folders regardless of permissions - Editors can view/edit/delete all dashboards/folders regardless of permissions - Editors can create dashboards in any folder regardless of permissions - Anonymous users with viewer/editor roles are similarly affected Organization isolation boundaries remain intact. The vulnerability only affects dashboard access and does not grant access to datasources.

AI-Powered Analysis

AILast updated: 01/15/2026, 13:33:28 UTC

Technical Analysis

CVE-2026-0713 is an authorization bypass vulnerability classified under CWE-863, found in the Incoming Goods Suite by SICK AG, specifically affecting the /apis/dashboard.grafana.app/* API endpoints. This flaw exists across all API versions (v0alpha1, v1alpha1, v2alpha1) and allows authenticated users with viewer or editor roles to circumvent the intended permission checks on dashboards and folders. Viewers can view all dashboards and folders regardless of assigned permissions, while editors can view, edit, delete, and create dashboards in any folder without restriction. Notably, anonymous users assigned viewer or editor roles are equally affected, which broadens the attack surface. The vulnerability does not compromise organizational isolation boundaries or grant access to underlying datasources, limiting the scope to dashboard management. The CVSS v3.1 score of 8.3 reflects the high impact on confidentiality and integrity, with low attack complexity and no user interaction required. The vulnerability is remotely exploitable over the network by users with low privileges, making it a critical concern for environments relying on strict dashboard access controls. No patches or exploits are currently documented, but the absence of a fix increases risk exposure. This vulnerability could lead to unauthorized disclosure of sensitive operational data and unauthorized modification or deletion of dashboards, potentially disrupting monitoring and decision-making processes within affected organizations.

Potential Impact

For European organizations, especially those in manufacturing, logistics, and supply chain sectors that utilize SICK AG's Incoming Goods Suite, this vulnerability poses a significant risk. Unauthorized viewing of dashboards can lead to leakage of sensitive operational data, including inventory and supply chain metrics. Unauthorized editing or deletion of dashboards can disrupt monitoring and reporting workflows, potentially causing operational delays or incorrect decision-making. Since the vulnerability allows creation of dashboards in any folder, attackers could introduce misleading or malicious dashboards to confuse or mislead users. Although datasource access is not compromised, the integrity and confidentiality of dashboard data are severely impacted. The vulnerability's ease of exploitation by low-privileged users increases the likelihood of insider threats or compromised accounts being leveraged. Given the critical role of such suites in industrial automation and logistics, exploitation could indirectly affect availability of services or cause reputational damage. European organizations with strict regulatory requirements around data confidentiality and integrity (e.g., GDPR) may face compliance risks if unauthorized data exposure occurs.

Mitigation Recommendations

Immediate mitigation should focus on restricting access to the affected API endpoints by implementing network-level controls such as IP whitelisting or VPN requirements. Organizations should audit and minimize the assignment of viewer and editor roles, especially for anonymous users, until patches are available. Implement strict monitoring and alerting on dashboard creation, modification, and deletion activities to detect anomalous behavior. Employ multi-factor authentication and robust account management to reduce the risk of compromised credentials being used to exploit this vulnerability. If possible, isolate the Incoming Goods Suite environment from broader networks to limit exposure. Engage with SICK AG for timely patches or updates and apply them as soon as they are released. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized API calls targeting dashboard endpoints. Conduct regular security assessments and penetration tests focusing on authorization controls within the suite. Document and enforce strict role-based access control policies to prevent privilege escalation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SICK AG
Date Reserved
2026-01-08T09:59:09.364Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6968e9244c611209ad0e712e

Added to database: 1/15/2026, 1:18:28 PM

Last enriched: 1/15/2026, 1:33:28 PM

Last updated: 1/15/2026, 7:25:51 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats