Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22910: CWE-1391 Use of Weak Credentials in SICK AG TDC-X401GL

0
High
VulnerabilityCVE-2026-22910cvecve-2026-22910cwe-1391
Published: Thu Jan 15 2026 (01/15/2026, 13:02:02 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: TDC-X401GL

Description

The device is deployed with weak and publicly known default passwords for certain hidden user levels, increasing the risk of unauthorized access. This represents a high risk to the integrity of the system.

AI-Powered Analysis

AILast updated: 01/15/2026, 13:32:36 UTC

Technical Analysis

CVE-2026-22910 identifies a vulnerability in the SICK AG TDC-X401GL device, which is widely used in industrial automation and safety monitoring. The core issue is the use of weak, publicly known default passwords assigned to certain hidden user levels within the device. These credentials allow attackers to gain unauthorized access remotely without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability compromises the confidentiality of the system, as unauthorized actors could access sensitive information or potentially manipulate device settings. The device is affected in all versions, indicating a systemic issue in the product's default configuration. While no exploits have been reported in the wild yet, the low complexity of attack and lack of required authentication make this a high-risk vulnerability. The CWE-1391 classification highlights the weakness in credential management. The absence of patches at the time of publication necessitates immediate compensating controls. This vulnerability is particularly concerning for industrial environments where the TDC-X401GL is deployed, as unauthorized access could lead to data leakage or indirect impacts on system integrity through configuration changes. The vulnerability's publication in early 2026 underscores the need for rapid response from affected organizations.

Potential Impact

For European organizations, the impact of CVE-2026-22910 is significant due to the critical role of SICK AG devices in industrial automation, manufacturing, and safety systems. Unauthorized access to these devices can lead to exposure of sensitive operational data, potentially allowing industrial espionage or competitive intelligence gathering. Although the vulnerability does not directly affect system integrity or availability, unauthorized access could enable attackers to alter configurations or prepare for further attacks that might disrupt operations. The confidentiality breach could also violate data protection regulations such as GDPR if personal or sensitive data is involved. The widespread use of SICK AG products in European industrial sectors, especially in Germany, France, Italy, and the Benelux region, increases the likelihood of targeted exploitation. The vulnerability could also undermine trust in industrial control systems and lead to costly incident response and remediation efforts. Additionally, the potential for lateral movement within segmented networks could expand the attack impact beyond the initially compromised device.

Mitigation Recommendations

1. Immediately change all default and weak passwords on the TDC-X401GL devices to strong, unique credentials following best practices for password complexity and management. 2. Implement network segmentation to isolate these devices from general IT networks and limit access only to authorized personnel and systems. 3. Employ strict access control lists (ACLs) and firewall rules to restrict remote access to the devices, allowing connections only from trusted IP addresses or VPNs. 4. Continuously monitor network traffic and device logs for unusual access patterns or repeated failed login attempts that could indicate exploitation attempts. 5. Engage with SICK AG for any forthcoming patches or firmware updates addressing this vulnerability and plan for timely deployment once available. 6. Conduct regular security audits and penetration tests focusing on industrial control systems to detect similar weaknesses. 7. Educate operational technology (OT) staff about the risks of default credentials and enforce policies to prevent their use. 8. Consider deploying intrusion detection/prevention systems tailored for industrial protocols to detect unauthorized access attempts. 9. Maintain an incident response plan specific to OT environments to quickly contain and remediate any compromise related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SICK AG
Date Reserved
2026-01-13T09:11:11.447Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6968e9244c611209ad0e7156

Added to database: 1/15/2026, 1:18:28 PM

Last enriched: 1/15/2026, 1:32:36 PM

Last updated: 1/15/2026, 7:24:27 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats