Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22912: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in SICK AG TDC-X401GL

0
Medium
VulnerabilityCVE-2026-22912cvecve-2026-22912cwe-601
Published: Thu Jan 15 2026 (01/15/2026, 13:03:15 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: TDC-X401GL

Description

Improper validation of a login parameter may allow attackers to redirect users to malicious websites after authentication. This can lead to various risk including stealing credentials from unsuspecting users.

AI-Powered Analysis

AILast updated: 01/15/2026, 13:35:58 UTC

Technical Analysis

CVE-2026-22912 is classified as a CWE-601 open redirect vulnerability found in the SICK AG TDC-X401GL device. The root cause is improper validation of a login parameter that controls URL redirection after user authentication. When a user logs in, the application accepts a redirect URL parameter without sufficient validation, allowing an attacker to craft a URL that redirects the user to an arbitrary external site after successful login. This can be exploited to conduct phishing attacks by redirecting users to malicious websites designed to steal credentials or deliver malware. The vulnerability does not require any privileges or authentication to initiate the attack, but user interaction is necessary since the victim must log in and follow the manipulated redirect. The CVSS 3.1 score of 4.3 reflects that the attack vector is network-based with low attack complexity and no privileges required, but user interaction is necessary. Confidentiality impact is low as the vulnerability itself does not disclose information but can facilitate credential theft indirectly. Integrity and availability impacts are none. No patches or known exploits are currently reported, indicating this is a newly disclosed vulnerability. The affected product, TDC-X401GL, is used in industrial automation and logistics environments, where secure authentication and session management are critical. The vulnerability highlights the importance of validating redirect parameters to prevent open redirect attacks that can undermine user trust and security.

Potential Impact

For European organizations, especially those in industrial automation, manufacturing, and logistics sectors using SICK AG TDC-X401GL devices, this vulnerability poses a risk of phishing and credential theft. Attackers can exploit the open redirect to lure authenticated users to malicious sites, potentially capturing login credentials or deploying further attacks such as malware infections or session hijacking. Although the vulnerability does not directly compromise device integrity or availability, stolen credentials could be leveraged to gain unauthorized access to sensitive systems or networks, leading to broader security incidents. This risk is heightened in critical infrastructure sectors where SICK AG products are commonly deployed. The medium severity rating indicates a moderate risk, but the potential for lateral movement and escalation after credential compromise could amplify the impact. Organizations may face operational disruptions, data breaches, and reputational damage if attackers successfully exploit this vulnerability.

Mitigation Recommendations

1. Implement strict validation and sanitization of all URL redirect parameters on the TDC-X401GL device to ensure only trusted internal URLs are accepted. 2. Employ an allowlist approach for redirect URLs, rejecting any redirect requests to external or untrusted domains. 3. If possible, disable URL redirection after login or require explicit user confirmation before redirecting. 4. Educate users about the risks of phishing and instruct them to verify URLs before following redirects, especially after authentication. 5. Monitor network traffic and logs for suspicious redirect attempts or unusual login patterns that may indicate exploitation attempts. 6. Coordinate with SICK AG for firmware updates or patches addressing this vulnerability and apply them promptly once available. 7. Use multi-factor authentication (MFA) to reduce the risk of credential compromise even if phishing occurs. 8. Conduct regular security assessments of web interfaces and authentication flows to detect similar vulnerabilities early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SICK AG
Date Reserved
2026-01-13T09:11:11.448Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6968e9244c611209ad0e7166

Added to database: 1/15/2026, 1:18:28 PM

Last enriched: 1/15/2026, 1:35:58 PM

Last updated: 1/15/2026, 7:52:56 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats