Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1775: CWE-306 Missing Authentication for Critical Function in Labkotec LID-3300IP

0
High
VulnerabilityCVE-2026-1775cvecve-2026-1775cwe-306
Published: Tue Mar 03 2026 (03/03/2026, 21:21:09 UTC)
Source: CVE Database V5
Vendor/Project: Labkotec
Product: LID-3300IP

Description

The Labkotec LID-3300IP has an existing vulnerability in the ice detector software that enables an unauthenticated attacker to alter device parameters and run operational commands when specially crafted packets are sent to the device.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 20:08:01 UTC

Technical Analysis

CVE-2026-1775 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting the Labkotec LID-3300IP ice detector. This device is used to monitor ice accumulation, often in critical infrastructure environments such as ports, bridges, and industrial facilities. The vulnerability allows an unauthenticated attacker to send specially crafted network packets to the device, bypassing any authentication mechanisms, to alter device parameters and execute operational commands. This means the attacker can manipulate the device’s behavior, potentially causing false readings or disabling the ice detection functionality. The CVSS 4.0 base score is 8.8, reflecting high severity due to the vulnerability’s remote exploitability without any authentication or user interaction, and its impact on both integrity and availability of the device’s functions. The vulnerability affects all versions of the product, and no patches or mitigations have been published by the vendor at the time of disclosure. The lack of authentication on critical functions is a fundamental security design flaw, making the device susceptible to remote takeover or sabotage. Given the device’s role in safety-critical monitoring, exploitation could lead to operational disruptions or safety hazards in environments relying on accurate ice detection.

Potential Impact

The impact of CVE-2026-1775 is significant for organizations using Labkotec LID-3300IP devices in safety-critical environments. By allowing unauthenticated remote attackers to alter device parameters and operational commands, the vulnerability threatens the integrity and availability of ice detection systems. This can lead to false negatives or false positives in ice detection, potentially causing unsafe conditions on infrastructure such as bridges, ports, and industrial plants. Disruption or manipulation of ice detection could result in physical damage, operational downtime, or safety incidents. The vulnerability’s ease of exploitation and lack of authentication requirements increase the risk of targeted attacks or opportunistic exploitation. Although no known exploits are reported yet, the high CVSS score and critical nature of the device’s function make this a priority risk. Organizations may face regulatory and liability issues if exploitation leads to accidents or failures in safety monitoring.

Mitigation Recommendations

Since no official patches or firmware updates are currently available from Labkotec, organizations should implement compensating controls to mitigate this vulnerability. First, isolate the LID-3300IP devices on segmented, trusted networks with strict access controls to prevent unauthorized network access. Employ network-level filtering such as firewalls or intrusion prevention systems to block unsolicited or suspicious packets targeting the device’s communication ports. Monitor network traffic for anomalous activity directed at these devices. Where possible, disable remote management interfaces or restrict them to known, authenticated administrators via VPN or secure channels. Conduct regular audits of device configurations and logs to detect unauthorized changes. Engage with Labkotec for updates and apply patches promptly once available. Additionally, consider deploying redundant or alternative ice detection methods to maintain operational safety during remediation. Finally, update incident response plans to include scenarios involving manipulation of critical monitoring devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-02T17:02:21.300Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a75724d1a09e29cb7c9d27

Added to database: 3/3/2026, 9:48:20 PM

Last enriched: 3/11/2026, 8:08:01 PM

Last updated: 4/18/2026, 2:41:50 PM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses