CVE-2026-2330: CWE-552 Files or Directories Accessible to External Parties in SICK AG SICK Lector85x
CVE-2026-2330 is a critical vulnerability in the SICK AG Lector85x device, allowing unauthenticated attackers to access restricted filesystem areas via the CROWN REST interface due to incomplete whitelist enforcement. Attackers can access internal testing directories not covered by the whitelist and place manipulated parameter files that activate after a reboot. This enables modification of critical device settings, including network and application configurations, without any authentication or user interaction. The vulnerability has a CVSS score of 9. 4, indicating high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Organizations using SICK Lector85x devices should urgently apply patches or implement mitigations to prevent unauthorized access and configuration tampering. This threat primarily affects industries relying on SICK AG's industrial sensor products, especially in manufacturing and automation sectors worldwide.
AI Analysis
Technical Summary
CVE-2026-2330 is a vulnerability identified in the SICK AG Lector85x series of industrial sensor devices. The root cause is incomplete enforcement of a whitelist in the device's CROWN REST interface, which governs access to filesystem directories. Specifically, certain directories intended solely for internal testing were omitted from the whitelist, making them accessible without authentication. An attacker exploiting this flaw can place a manipulated parameter file within these directories. Upon the device rebooting, this parameter file becomes active, allowing the attacker to modify critical device settings such as network configurations and application parameters. This unauthorized modification capability can lead to severe consequences, including disruption of device operations, network compromise, and potential pivoting within industrial environments. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS 3.1 base score of 9.4 reflects the vulnerability's critical nature, with low attack complexity, no privileges required, and high impact on confidentiality, integrity, and availability. While no known exploits have been reported in the wild yet, the potential for impactful attacks is significant given the device's role in industrial automation and sensing.
Potential Impact
The impact of CVE-2026-2330 is substantial for organizations deploying SICK Lector85x devices, which are commonly used in industrial automation, manufacturing, and logistics. An attacker gaining unauthorized access to the device's filesystem and modifying configuration parameters can disrupt operational processes, cause device malfunctions, or create persistent backdoors for further network intrusion. Network configuration changes could isolate devices, degrade communication, or expose internal networks to additional attacks. Application parameter modifications might alter sensor readings or processing logic, leading to incorrect data outputs, process errors, or safety hazards. The compromise of these devices could also serve as a foothold for attackers to move laterally within industrial control systems, potentially impacting broader operational technology environments. Given the critical nature of industrial processes relying on these devices, the vulnerability poses risks to operational continuity, safety, and data integrity on a global scale.
Mitigation Recommendations
To mitigate CVE-2026-2330, organizations should: 1) Immediately check for and apply any official patches or firmware updates released by SICK AG addressing this vulnerability. 2) If patches are unavailable, restrict network access to the CROWN REST interface by implementing network segmentation and firewall rules that limit access to trusted management hosts only. 3) Monitor device logs and network traffic for unusual access patterns or unauthorized file modifications in the filesystem, especially in directories related to internal testing. 4) Implement strict configuration management and integrity verification mechanisms to detect unauthorized changes to device parameters. 5) Consider disabling or restricting the CROWN REST interface if it is not required for normal operations. 6) Conduct regular security assessments of industrial devices and update asset inventories to ensure all vulnerable devices are identified and remediated. 7) Collaborate with SICK AG support channels for guidance and to receive timely updates on vulnerability status and remediation.
Affected Countries
Germany, United States, China, Japan, South Korea, France, Italy, United Kingdom, Canada, Netherlands
CVE-2026-2330: CWE-552 Files or Directories Accessible to External Parties in SICK AG SICK Lector85x
Description
CVE-2026-2330 is a critical vulnerability in the SICK AG Lector85x device, allowing unauthenticated attackers to access restricted filesystem areas via the CROWN REST interface due to incomplete whitelist enforcement. Attackers can access internal testing directories not covered by the whitelist and place manipulated parameter files that activate after a reboot. This enables modification of critical device settings, including network and application configurations, without any authentication or user interaction. The vulnerability has a CVSS score of 9. 4, indicating high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Organizations using SICK Lector85x devices should urgently apply patches or implement mitigations to prevent unauthorized access and configuration tampering. This threat primarily affects industries relying on SICK AG's industrial sensor products, especially in manufacturing and automation sectors worldwide.
AI-Powered Analysis
Technical Analysis
CVE-2026-2330 is a vulnerability identified in the SICK AG Lector85x series of industrial sensor devices. The root cause is incomplete enforcement of a whitelist in the device's CROWN REST interface, which governs access to filesystem directories. Specifically, certain directories intended solely for internal testing were omitted from the whitelist, making them accessible without authentication. An attacker exploiting this flaw can place a manipulated parameter file within these directories. Upon the device rebooting, this parameter file becomes active, allowing the attacker to modify critical device settings such as network configurations and application parameters. This unauthorized modification capability can lead to severe consequences, including disruption of device operations, network compromise, and potential pivoting within industrial environments. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS 3.1 base score of 9.4 reflects the vulnerability's critical nature, with low attack complexity, no privileges required, and high impact on confidentiality, integrity, and availability. While no known exploits have been reported in the wild yet, the potential for impactful attacks is significant given the device's role in industrial automation and sensing.
Potential Impact
The impact of CVE-2026-2330 is substantial for organizations deploying SICK Lector85x devices, which are commonly used in industrial automation, manufacturing, and logistics. An attacker gaining unauthorized access to the device's filesystem and modifying configuration parameters can disrupt operational processes, cause device malfunctions, or create persistent backdoors for further network intrusion. Network configuration changes could isolate devices, degrade communication, or expose internal networks to additional attacks. Application parameter modifications might alter sensor readings or processing logic, leading to incorrect data outputs, process errors, or safety hazards. The compromise of these devices could also serve as a foothold for attackers to move laterally within industrial control systems, potentially impacting broader operational technology environments. Given the critical nature of industrial processes relying on these devices, the vulnerability poses risks to operational continuity, safety, and data integrity on a global scale.
Mitigation Recommendations
To mitigate CVE-2026-2330, organizations should: 1) Immediately check for and apply any official patches or firmware updates released by SICK AG addressing this vulnerability. 2) If patches are unavailable, restrict network access to the CROWN REST interface by implementing network segmentation and firewall rules that limit access to trusted management hosts only. 3) Monitor device logs and network traffic for unusual access patterns or unauthorized file modifications in the filesystem, especially in directories related to internal testing. 4) Implement strict configuration management and integrity verification mechanisms to detect unauthorized changes to device parameters. 5) Consider disabling or restricting the CROWN REST interface if it is not required for normal operations. 6) Conduct regular security assessments of industrial devices and update asset inventories to ensure all vulnerable devices are identified and remediated. 7) Collaborate with SICK AG support channels for guidance and to receive timely updates on vulnerability status and remediation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SICK AG
- Date Reserved
- 2026-02-11T09:33:15.947Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69aa89c1c48b3f10ff2e8a7f
Added to database: 3/6/2026, 8:01:05 AM
Last enriched: 3/6/2026, 8:15:36 AM
Last updated: 3/6/2026, 3:09:50 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.