CVE-2026-22919: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in SICK AG TDC-X401GL
An attacker with administrative access may inject malicious content into the login page, potentially enabling cross-site scripting (XSS) attacks, leading to the extraction of sensitive data.
AI Analysis
Technical Summary
CVE-2026-22919 identifies a cross-site scripting (XSS) vulnerability classified under CWE-79 in the SICK AG TDC-X401GL product. The vulnerability arises from improper neutralization of input during web page generation, specifically on the device's login page. An attacker who already has administrative access to the device's web interface can inject malicious scripts into the login page content. This injected code can execute in the context of users accessing the login page, potentially allowing the attacker to steal sensitive information such as session tokens or credentials, or perform actions on behalf of legitimate users. The CVSS 3.1 base score is 3.8, reflecting low severity due to the requirement of administrative privileges (PR:H), no user interaction (UI:N), and limited impact on confidentiality and integrity (C:L/I:L) without affecting availability (A:N). The vulnerability does not have any publicly known exploits at this time. The affected product is an industrial automation device used in various sectors, and the vulnerability could be leveraged in targeted attacks where administrative credentials are compromised or insider threats exist. Since the vulnerability is in the login page, it could facilitate further compromise or lateral movement within an organization's network if exploited.
Potential Impact
For European organizations, the impact of this vulnerability is primarily on the confidentiality and integrity of data handled by the TDC-X401GL device. Although the vulnerability requires administrative access, if an attacker gains such access—through credential theft, insider threat, or other means—they could inject malicious scripts that compromise user sessions or extract sensitive information. This could lead to unauthorized control or data leakage within industrial control systems, potentially disrupting operational technology environments. While availability is not directly affected, the indirect consequences of data compromise could lead to operational disruptions or loss of trust. European industries relying on SICK AG devices, especially in manufacturing, logistics, and automation, could face targeted attacks exploiting this vulnerability to gain deeper access or exfiltrate data. The low CVSS score suggests limited immediate risk, but the specialized nature of the device and its role in critical infrastructure elevate the importance of addressing this issue.
Mitigation Recommendations
To mitigate CVE-2026-22919, organizations should implement strict administrative access controls, ensuring that only trusted personnel have administrative privileges on the TDC-X401GL device. Employ network segmentation to isolate the device from broader enterprise networks, reducing exposure. Monitor administrative activity logs for unusual or unauthorized changes to the login page or web interface content. Since no patch is currently available, consider deploying web application firewalls (WAFs) or reverse proxies that can detect and block malicious script injections. Enforce strong authentication mechanisms, such as multi-factor authentication, for administrative access to reduce the risk of credential compromise. Regularly audit device configurations and perform security assessments to detect potential misuse. Once a vendor patch or update is released, prioritize its deployment. Additionally, educate administrators about the risks of XSS and the importance of secure input handling.
Affected Countries
Germany, France, Italy, Netherlands, Belgium
CVE-2026-22919: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in SICK AG TDC-X401GL
Description
An attacker with administrative access may inject malicious content into the login page, potentially enabling cross-site scripting (XSS) attacks, leading to the extraction of sensitive data.
AI-Powered Analysis
Technical Analysis
CVE-2026-22919 identifies a cross-site scripting (XSS) vulnerability classified under CWE-79 in the SICK AG TDC-X401GL product. The vulnerability arises from improper neutralization of input during web page generation, specifically on the device's login page. An attacker who already has administrative access to the device's web interface can inject malicious scripts into the login page content. This injected code can execute in the context of users accessing the login page, potentially allowing the attacker to steal sensitive information such as session tokens or credentials, or perform actions on behalf of legitimate users. The CVSS 3.1 base score is 3.8, reflecting low severity due to the requirement of administrative privileges (PR:H), no user interaction (UI:N), and limited impact on confidentiality and integrity (C:L/I:L) without affecting availability (A:N). The vulnerability does not have any publicly known exploits at this time. The affected product is an industrial automation device used in various sectors, and the vulnerability could be leveraged in targeted attacks where administrative credentials are compromised or insider threats exist. Since the vulnerability is in the login page, it could facilitate further compromise or lateral movement within an organization's network if exploited.
Potential Impact
For European organizations, the impact of this vulnerability is primarily on the confidentiality and integrity of data handled by the TDC-X401GL device. Although the vulnerability requires administrative access, if an attacker gains such access—through credential theft, insider threat, or other means—they could inject malicious scripts that compromise user sessions or extract sensitive information. This could lead to unauthorized control or data leakage within industrial control systems, potentially disrupting operational technology environments. While availability is not directly affected, the indirect consequences of data compromise could lead to operational disruptions or loss of trust. European industries relying on SICK AG devices, especially in manufacturing, logistics, and automation, could face targeted attacks exploiting this vulnerability to gain deeper access or exfiltrate data. The low CVSS score suggests limited immediate risk, but the specialized nature of the device and its role in critical infrastructure elevate the importance of addressing this issue.
Mitigation Recommendations
To mitigate CVE-2026-22919, organizations should implement strict administrative access controls, ensuring that only trusted personnel have administrative privileges on the TDC-X401GL device. Employ network segmentation to isolate the device from broader enterprise networks, reducing exposure. Monitor administrative activity logs for unusual or unauthorized changes to the login page or web interface content. Since no patch is currently available, consider deploying web application firewalls (WAFs) or reverse proxies that can detect and block malicious script injections. Enforce strong authentication mechanisms, such as multi-factor authentication, for administrative access to reduce the risk of credential compromise. Regularly audit device configurations and perform security assessments to detect potential misuse. Once a vendor patch or update is released, prioritize its deployment. Additionally, educate administrators about the risks of XSS and the importance of secure input handling.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SICK AG
- Date Reserved
- 2026-01-13T09:11:12.759Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6968e9254c611209ad0e71a8
Added to database: 1/15/2026, 1:18:29 PM
Last enriched: 1/15/2026, 1:34:10 PM
Last updated: 1/15/2026, 4:19:18 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64516: CWE-284: Improper Access Control in glpi-project glpi
HighCVE-2024-36856: n/a
HighCVE-2025-70309: n/a
UnknownCVE-2025-67246: n/a
HighCVE-2024-21917: CWE-347 Improper Verification of Cryptographic Signature in Rockwell Automation FactoryTalk® Service Platform
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.