Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2330: CWE-552 Files or Directories Accessible to External Parties in SICK AG SICK Lector85x

0
Critical
VulnerabilityCVE-2026-2330cvecve-2026-2330cwe-552
Published: Fri Mar 06 2026 (03/06/2026, 07:54:45 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: SICK Lector85x

Description

CVE-2026-2330 is a critical vulnerability in the SICK AG Lector85x device, allowing unauthenticated attackers to access restricted filesystem areas via the CROWN REST interface due to incomplete whitelist enforcement. Attackers can access internal testing directories not covered by the whitelist and place manipulated parameter files that activate after a reboot. This enables modification of critical device settings, including network and application configurations, without any authentication or user interaction. The vulnerability has a CVSS score of 9. 4, indicating high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Organizations using SICK Lector85x devices should urgently apply patches or implement mitigations to prevent unauthorized access and configuration tampering. This threat primarily affects industries relying on SICK AG's industrial sensor products, especially in manufacturing and automation sectors worldwide.

AI-Powered Analysis

AILast updated: 03/06/2026, 08:15:36 UTC

Technical Analysis

CVE-2026-2330 is a vulnerability identified in the SICK AG Lector85x series of industrial sensor devices. The root cause is incomplete enforcement of a whitelist in the device's CROWN REST interface, which governs access to filesystem directories. Specifically, certain directories intended solely for internal testing were omitted from the whitelist, making them accessible without authentication. An attacker exploiting this flaw can place a manipulated parameter file within these directories. Upon the device rebooting, this parameter file becomes active, allowing the attacker to modify critical device settings such as network configurations and application parameters. This unauthorized modification capability can lead to severe consequences, including disruption of device operations, network compromise, and potential pivoting within industrial environments. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS 3.1 base score of 9.4 reflects the vulnerability's critical nature, with low attack complexity, no privileges required, and high impact on confidentiality, integrity, and availability. While no known exploits have been reported in the wild yet, the potential for impactful attacks is significant given the device's role in industrial automation and sensing.

Potential Impact

The impact of CVE-2026-2330 is substantial for organizations deploying SICK Lector85x devices, which are commonly used in industrial automation, manufacturing, and logistics. An attacker gaining unauthorized access to the device's filesystem and modifying configuration parameters can disrupt operational processes, cause device malfunctions, or create persistent backdoors for further network intrusion. Network configuration changes could isolate devices, degrade communication, or expose internal networks to additional attacks. Application parameter modifications might alter sensor readings or processing logic, leading to incorrect data outputs, process errors, or safety hazards. The compromise of these devices could also serve as a foothold for attackers to move laterally within industrial control systems, potentially impacting broader operational technology environments. Given the critical nature of industrial processes relying on these devices, the vulnerability poses risks to operational continuity, safety, and data integrity on a global scale.

Mitigation Recommendations

To mitigate CVE-2026-2330, organizations should: 1) Immediately check for and apply any official patches or firmware updates released by SICK AG addressing this vulnerability. 2) If patches are unavailable, restrict network access to the CROWN REST interface by implementing network segmentation and firewall rules that limit access to trusted management hosts only. 3) Monitor device logs and network traffic for unusual access patterns or unauthorized file modifications in the filesystem, especially in directories related to internal testing. 4) Implement strict configuration management and integrity verification mechanisms to detect unauthorized changes to device parameters. 5) Consider disabling or restricting the CROWN REST interface if it is not required for normal operations. 6) Conduct regular security assessments of industrial devices and update asset inventories to ensure all vulnerable devices are identified and remediated. 7) Collaborate with SICK AG support channels for guidance and to receive timely updates on vulnerability status and remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
SICK AG
Date Reserved
2026-02-11T09:33:15.947Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69aa89c1c48b3f10ff2e8a7f

Added to database: 3/6/2026, 8:01:05 AM

Last enriched: 3/6/2026, 8:15:36 AM

Last updated: 3/6/2026, 3:09:50 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses