Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22641: CWE-285 Improper Authorization in SICK AG Incoming Goods Suite

0
Medium
VulnerabilityCVE-2026-22641cvecve-2026-22641cwe-285
Published: Thu Jan 15 2026 (01/15/2026, 13:13:11 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: Incoming Goods Suite

Description

This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path. Users with minimal permissions could gain unauthorized read access to GET endpoints in Alertmanager and Prometheus datasources. The issue primarily affects datasources that implement route-specific permissions, including Alertmanager and certain Prometheus-based datasources.

AI-Powered Analysis

AILast updated: 01/15/2026, 13:49:17 UTC

Technical Analysis

CVE-2026-22641 is an improper authorization vulnerability (CWE-285) found in SICK AG's Incoming Goods Suite, which integrates Grafana's datasource proxy API for monitoring purposes. The vulnerability arises because the authorization mechanism can be bypassed by manipulating the URL path, specifically by adding an extra slash character. This bypass allows users with minimal privileges to gain unauthorized read access to GET endpoints within Alertmanager and Prometheus datasources. These datasources implement route-specific permissions to restrict access, but the flaw undermines these controls, exposing potentially sensitive monitoring data. The vulnerability affects versions identified as '0' (likely indicating initial or early versions) and was published on January 15, 2026. The CVSS v3.1 base score is 5.0 (medium), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and a scope change with limited confidentiality impact. No known exploits have been reported, and no patches are currently available. The vulnerability does not affect data integrity or availability but compromises confidentiality by exposing read-only data that should be restricted. The issue is significant for environments relying on Grafana-based monitoring integrated with SICK AG’s suite, especially where sensitive operational data is monitored.

Potential Impact

For European organizations, the impact centers on unauthorized disclosure of monitoring data from Alertmanager and Prometheus datasources within the Incoming Goods Suite environment. This could lead to exposure of operational metrics, alerting information, and potentially sensitive infrastructure details that adversaries could use for reconnaissance or to plan further attacks. While the vulnerability does not allow modification or disruption of data, the confidentiality breach could undermine trust in monitoring systems and reveal internal process details. Industries such as manufacturing, logistics, and industrial automation—where SICK AG products are commonly deployed—could face increased risk of targeted espionage or competitive intelligence gathering. The medium severity rating reflects the limited scope of impact but highlights the importance of protecting monitoring data in critical infrastructure environments prevalent across Europe.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. These include: 1) Restricting network access to the Incoming Goods Suite and Grafana datasource proxy API to trusted internal networks and VPNs only. 2) Implementing strict firewall rules and web application firewall (WAF) policies to detect and block URL path anomalies such as extra slashes. 3) Enhancing authentication and authorization monitoring to detect unusual access patterns or privilege escalations. 4) Conducting thorough audits of user permissions to ensure minimal necessary access is granted. 5) Monitoring logs for unauthorized read attempts on Alertmanager and Prometheus endpoints. 6) Planning for rapid deployment of vendor patches once available and coordinating with SICK AG for updates. 7) Considering temporary disabling or isolating vulnerable datasource integrations if feasible. These targeted measures go beyond generic advice by focusing on network-level controls, anomaly detection, and strict access governance specific to this vulnerability’s exploitation vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SICK AG
Date Reserved
2026-01-08T09:59:06.198Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6968ec9a4c611209ad10ad01

Added to database: 1/15/2026, 1:33:14 PM

Last enriched: 1/15/2026, 1:49:17 PM

Last updated: 1/15/2026, 4:40:30 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats