Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22916: CWE-266 Incorrect Privilege Assignment in SICK AG TDC-X401GL

0
Medium
VulnerabilityCVE-2026-22916cvecve-2026-22916cwe-266
Published: Thu Jan 15 2026 (01/15/2026, 13:07:07 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: TDC-X401GL

Description

An attacker with low privileges may be able to trigger critical system functions such as reboot or factory reset without proper restrictions, potentially leading to service disruption or loss of configuration.

AI-Powered Analysis

AILast updated: 01/15/2026, 13:34:58 UTC

Technical Analysis

CVE-2026-22916 identifies an incorrect privilege assignment vulnerability (CWE-266) in the SICK AG TDC-X401GL device, a product commonly used in industrial automation and sensing applications. The flaw allows an attacker with low-level privileges to execute critical system functions such as rebooting the device or performing a factory reset without proper authorization checks. This lack of proper access control means that an attacker who has gained minimal access—potentially through other means or default credentials—can disrupt device availability or erase configuration settings, leading to operational downtime or the need for manual reconfiguration. The vulnerability affects all versions of the TDC-X401GL product and can be exploited remotely over the network without requiring user interaction, increasing the attack surface. The CVSS v3.1 score of 4.3 reflects a medium severity primarily due to the impact on availability and the low complexity of attack, though confidentiality and integrity are not directly affected. No patches or updates have been published yet by SICK AG, and no known exploits have been observed in the wild. However, the potential for service disruption in critical industrial environments makes this vulnerability significant. Organizations using these devices should assess their exposure and implement compensating controls until a patch is available.

Potential Impact

For European organizations, especially those in manufacturing, industrial automation, and critical infrastructure sectors, this vulnerability poses a risk of operational disruption. The ability of an attacker to reboot or factory reset devices remotely can cause downtime, loss of configuration data, and potential delays in production or service delivery. This can lead to financial losses, reduced productivity, and in some cases, safety risks if automated processes are interrupted unexpectedly. Since the vulnerability does not affect confidentiality or integrity directly, the primary concern is availability. The lack of authentication barriers for critical functions increases the risk of insider threats or attackers who have gained low-level network access. Given the widespread use of SICK AG products in European industrial environments, the impact could be significant if exploited at scale or targeted against critical facilities.

Mitigation Recommendations

In the absence of official patches, European organizations should implement network segmentation to isolate TDC-X401GL devices from untrusted networks and limit access to trusted administrators only. Employ strict access control lists (ACLs) and firewall rules to restrict management interfaces to authorized IP addresses. Monitor device logs and network traffic for unusual reboot or reset commands. Change default credentials and enforce strong authentication mechanisms if supported by the device. Consider deploying intrusion detection systems (IDS) to alert on suspicious activity targeting these devices. Regularly back up device configurations to enable rapid restoration in case of factory reset exploitation. Engage with SICK AG support channels to obtain updates on patch availability and apply them promptly once released. Additionally, conduct security awareness training for personnel managing these devices to recognize and respond to potential exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SICK AG
Date Reserved
2026-01-13T09:11:11.448Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6968e9254c611209ad0e7190

Added to database: 1/15/2026, 1:18:29 PM

Last enriched: 1/15/2026, 1:34:58 PM

Last updated: 1/15/2026, 4:48:44 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats