CVE-2026-1523: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in PRIMION DIGITEK Digitek ADT1100
CVE-2026-1523 is a high-severity path traversal vulnerability affecting all versions of PRIMION DIGITEK's Digitek ADT1100 and DT950 devices. It allows unauthenticated remote attackers to access arbitrary files on the server by exploiting insufficient input validation of URL-encoded directory traversal sequences. This can lead to sensitive information disclosure and potentially further system compromise. The vulnerability has a CVSS 4. 0 base score of 8. 7, indicating critical impact on confidentiality without requiring authentication or user interaction. No known exploits are currently reported in the wild. European organizations using these devices, especially in critical infrastructure or security-sensitive environments, are at risk. Mitigation requires strict input validation, patching when available, and network-level protections to restrict access to vulnerable devices. Countries with higher adoption of PRIMION DIGITEK products and strategic infrastructure reliance on these devices are most likely affected.
AI Analysis
Technical Summary
CVE-2026-1523 is a path traversal vulnerability classified under CWE-22, found in all versions of PRIMION DIGITEK's Digitek ADT1100 and DT950 products. The vulnerability arises from improper limitation of pathname inputs, allowing attackers to manipulate URL-encoded directory traversal sequences (e.g., '%2F' representing '/') to escape the intended directory context. By crafting HTTP requests containing sequences like '..%2F..%2F..%2Fetc%2Fpasswd', an attacker can retrieve arbitrary files from the server's filesystem. This bypasses input validation mechanisms that should restrict file access to a designated directory. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects a high impact on confidentiality with low attack complexity and no privileges required. Although no exploits are currently known in the wild, the ease of exploitation and potential for sensitive data exposure make this a critical issue. The affected devices are often used in access control and security management, increasing the potential impact of unauthorized file access. The lack of available patches at the time of disclosure necessitates immediate mitigation steps to reduce exposure.
Potential Impact
For European organizations, this vulnerability poses a significant risk of unauthorized disclosure of sensitive files, including configuration files, credentials, or other critical data stored on the affected devices. Such exposure could facilitate further attacks, including privilege escalation or lateral movement within networks. Organizations in sectors such as government, critical infrastructure, manufacturing, and building security that deploy PRIMION DIGITEK devices for access control or security monitoring are particularly vulnerable. The compromise of these devices could undermine physical security controls and lead to broader operational disruptions. Additionally, the ability to remotely exploit this vulnerability without authentication increases the attack surface, especially if devices are accessible from less secure network segments or the internet. The potential impact extends beyond confidentiality to operational integrity if attackers leverage disclosed information to disrupt or manipulate device functions.
Mitigation Recommendations
Immediate mitigation should focus on network-level controls: restrict access to Digitek ADT1100 and DT950 devices to trusted internal networks and management stations only, using firewalls and network segmentation. Implement strict ingress filtering to prevent unauthorized external access. Monitor device logs and network traffic for suspicious requests containing directory traversal patterns or unusual file access attempts. Until official patches are released, consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block URL-encoded traversal sequences targeting these devices. Review and harden device configurations to minimize exposed services and disable unnecessary features. Engage with PRIMION DIGITEK for patch availability and apply updates promptly once released. Conduct security awareness training for administrators managing these devices to recognize exploitation indicators. Finally, perform regular vulnerability assessments and penetration tests focusing on these devices to identify and remediate exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2026-1523: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in PRIMION DIGITEK Digitek ADT1100
Description
CVE-2026-1523 is a high-severity path traversal vulnerability affecting all versions of PRIMION DIGITEK's Digitek ADT1100 and DT950 devices. It allows unauthenticated remote attackers to access arbitrary files on the server by exploiting insufficient input validation of URL-encoded directory traversal sequences. This can lead to sensitive information disclosure and potentially further system compromise. The vulnerability has a CVSS 4. 0 base score of 8. 7, indicating critical impact on confidentiality without requiring authentication or user interaction. No known exploits are currently reported in the wild. European organizations using these devices, especially in critical infrastructure or security-sensitive environments, are at risk. Mitigation requires strict input validation, patching when available, and network-level protections to restrict access to vulnerable devices. Countries with higher adoption of PRIMION DIGITEK products and strategic infrastructure reliance on these devices are most likely affected.
AI-Powered Analysis
Technical Analysis
CVE-2026-1523 is a path traversal vulnerability classified under CWE-22, found in all versions of PRIMION DIGITEK's Digitek ADT1100 and DT950 products. The vulnerability arises from improper limitation of pathname inputs, allowing attackers to manipulate URL-encoded directory traversal sequences (e.g., '%2F' representing '/') to escape the intended directory context. By crafting HTTP requests containing sequences like '..%2F..%2F..%2Fetc%2Fpasswd', an attacker can retrieve arbitrary files from the server's filesystem. This bypasses input validation mechanisms that should restrict file access to a designated directory. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects a high impact on confidentiality with low attack complexity and no privileges required. Although no exploits are currently known in the wild, the ease of exploitation and potential for sensitive data exposure make this a critical issue. The affected devices are often used in access control and security management, increasing the potential impact of unauthorized file access. The lack of available patches at the time of disclosure necessitates immediate mitigation steps to reduce exposure.
Potential Impact
For European organizations, this vulnerability poses a significant risk of unauthorized disclosure of sensitive files, including configuration files, credentials, or other critical data stored on the affected devices. Such exposure could facilitate further attacks, including privilege escalation or lateral movement within networks. Organizations in sectors such as government, critical infrastructure, manufacturing, and building security that deploy PRIMION DIGITEK devices for access control or security monitoring are particularly vulnerable. The compromise of these devices could undermine physical security controls and lead to broader operational disruptions. Additionally, the ability to remotely exploit this vulnerability without authentication increases the attack surface, especially if devices are accessible from less secure network segments or the internet. The potential impact extends beyond confidentiality to operational integrity if attackers leverage disclosed information to disrupt or manipulate device functions.
Mitigation Recommendations
Immediate mitigation should focus on network-level controls: restrict access to Digitek ADT1100 and DT950 devices to trusted internal networks and management stations only, using firewalls and network segmentation. Implement strict ingress filtering to prevent unauthorized external access. Monitor device logs and network traffic for suspicious requests containing directory traversal patterns or unusual file access attempts. Until official patches are released, consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block URL-encoded traversal sequences targeting these devices. Review and harden device configurations to minimize exposed services and disable unnecessary features. Engage with PRIMION DIGITEK for patch availability and apply updates promptly once released. Conduct security awareness training for administrators managing these devices to recognize exploitation indicators. Finally, perform regular vulnerability assessments and penetration tests focusing on these devices to identify and remediate exposure.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- INCIBE
- Date Reserved
- 2026-01-28T10:54:43.233Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69849ef7f9fa50a62f23a794
Added to database: 2/5/2026, 1:45:27 PM
Last enriched: 2/5/2026, 1:59:31 PM
Last updated: 2/5/2026, 3:23:35 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14150: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IBM webMethods Integration (on prem) - Integration Server
MediumCVE-2025-13491: CWE-426 Untrusted Search Path in IBM App Connect Operator
MediumCVE-2026-1927: CWE-862 Missing Authorization in wpsoul Greenshift – animation and page builder blocks
MediumCVE-2025-13379: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in IBM Aspera Console
HighCVE-2026-1517: SQL Injection in iomad
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.