Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22914: CWE-266 Incorrect Privilege Assignment in SICK AG TDC-X401GL

0
Medium
VulnerabilityCVE-2026-22914cvecve-2026-22914cwe-266
Published: Thu Jan 15 2026 (01/15/2026, 13:06:19 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: TDC-X401GL

Description

An attacker with limited permissions may still be able to write files to specific locations on the device, potentially leading to system manipulation.

AI-Powered Analysis

AILast updated: 01/15/2026, 13:35:25 UTC

Technical Analysis

CVE-2026-22914 is a vulnerability identified in the SICK AG TDC-X401GL industrial device, classified under CWE-266 for incorrect privilege assignment. The flaw allows an attacker who already has limited permissions on the device to write files to specific locations that should normally be protected. This improper access control can enable the attacker to manipulate system files or configurations, potentially leading to unauthorized changes in device behavior or control logic. The vulnerability is network exploitable (AV:N) with low attack complexity (AC:L), requiring only limited privileges (PR:L) and no user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component. The CVSS v3.1 base score is 4.3, indicating a medium severity primarily due to the integrity impact without affecting confidentiality or availability. The vulnerability affects all versions of the TDC-X401GL, a device commonly used in industrial automation and safety systems. No patches or known exploits are currently available, but the risk lies in potential system manipulation by insiders or attackers who have gained limited access. This vulnerability highlights the importance of strict privilege separation and secure file system permissions in industrial control devices.

Potential Impact

For European organizations, especially those in manufacturing, industrial automation, and critical infrastructure sectors, this vulnerability poses a risk of unauthorized system manipulation. An attacker with limited access could alter device configurations or inject malicious files, potentially disrupting operational processes or safety functions. While confidentiality and availability are not directly impacted, integrity compromise can lead to incorrect device behavior, safety hazards, or production downtime. Given the widespread use of SICK AG products in Europe, particularly in Germany, France, Italy, and other industrialized nations, exploitation could affect critical supply chains and industrial operations. The vulnerability could also be leveraged as a foothold for further lateral movement within industrial networks. Although no exploits are currently known, the medium severity and ease of exploitation warrant proactive risk management to avoid operational disruptions and safety incidents.

Mitigation Recommendations

1. Implement strict access control policies limiting user permissions on the TDC-X401GL devices to the minimum necessary. 2. Monitor file system changes and write operations on critical directories to detect unauthorized modifications promptly. 3. Segment industrial control networks to restrict access to the devices only to trusted and authenticated users and systems. 4. Employ network-level protections such as firewalls and intrusion detection systems tailored for industrial protocols to detect anomalous activities. 5. Regularly audit device configurations and logs for signs of privilege misuse or unexpected file writes. 6. Engage with SICK AG for updates and patches addressing this vulnerability and apply them immediately upon release. 7. Train operational technology (OT) personnel on the risks of privilege escalation and the importance of secure device management. 8. Consider deploying application whitelisting or integrity verification mechanisms where feasible to prevent unauthorized file changes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SICK AG
Date Reserved
2026-01-13T09:11:11.448Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6968e9254c611209ad0e7180

Added to database: 1/15/2026, 1:18:29 PM

Last enriched: 1/15/2026, 1:35:25 PM

Last updated: 1/15/2026, 4:46:15 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats