Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22907: CWE-266 Incorrect Privilege Assignment in SICK AG TDC-X401GL

0
Critical
VulnerabilityCVE-2026-22907cvecve-2026-22907cwe-266
Published: Thu Jan 15 2026 (01/15/2026, 12:59:51 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: TDC-X401GL

Description

An attacker may gain unauthorized access to the host filesystem, potentially allowing them to read and modify system data.

AI-Powered Analysis

AILast updated: 01/15/2026, 13:33:16 UTC

Technical Analysis

CVE-2026-22907 is a critical security vulnerability identified in the SICK AG TDC-X401GL industrial device. The root cause is an incorrect privilege assignment (CWE-266), which allows an attacker with limited privileges to escalate their access rights and gain unauthorized access to the host filesystem. This unauthorized access enables the attacker to read and modify system data, potentially compromising the device’s confidentiality, integrity, and availability. The vulnerability is exploitable remotely over the network (Attack Vector: Network) with low attack complexity and does not require user interaction, making it highly dangerous. The CVSS v3.1 score of 9.9 reflects the critical nature of this flaw, with a scope change indicating that the impact extends beyond the initially compromised component to the entire system. Although no known exploits are currently reported in the wild, the vulnerability’s characteristics suggest that exploitation could lead to full system compromise, including unauthorized data disclosure, manipulation, and potential disruption of device operations. The TDC-X401GL is commonly used in industrial automation environments, where security breaches can have severe operational and safety consequences. The lack of available patches at the time of publication necessitates immediate risk mitigation through network segmentation, access control, and monitoring until vendor fixes are released.

Potential Impact

For European organizations, particularly those in manufacturing, industrial automation, and critical infrastructure sectors, this vulnerability poses a severe risk. Successful exploitation could lead to unauthorized disclosure of sensitive operational data, manipulation of device configurations, and disruption of industrial processes. This may result in operational downtime, safety hazards, financial losses, and reputational damage. Given the criticality of industrial control systems in Europe’s economy and infrastructure, a compromise of TDC-X401GL devices could have cascading effects on supply chains and production lines. Additionally, the ability to modify system data could facilitate further lateral movement within networks, increasing the risk of broader network compromise. The critical CVSS score underscores the urgency for European entities to assess their exposure and implement protective measures promptly.

Mitigation Recommendations

1. Monitor SICK AG’s official channels for patches addressing CVE-2026-22907 and apply them immediately upon release. 2. Until patches are available, restrict network access to TDC-X401GL devices by implementing strict firewall rules and network segmentation to isolate these devices from untrusted networks. 3. Enforce the principle of least privilege by reviewing and minimizing user and service account permissions on the affected devices. 4. Implement robust authentication and access control mechanisms to prevent unauthorized privilege escalation. 5. Continuously monitor device logs and network traffic for unusual access patterns or attempts to access the filesystem. 6. Conduct regular security audits and vulnerability assessments on industrial control systems to identify and remediate similar privilege assignment issues. 7. Train operational technology (OT) personnel on the risks associated with privilege escalation vulnerabilities and incident response procedures. 8. Consider deploying intrusion detection/prevention systems tailored for industrial environments to detect exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SICK AG
Date Reserved
2026-01-13T09:11:11.447Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6968e9244c611209ad0e713e

Added to database: 1/15/2026, 1:18:28 PM

Last enriched: 1/15/2026, 1:33:16 PM

Last updated: 1/15/2026, 7:51:24 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats