Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2330: CWE-552 Files or Directories Accessible to External Parties in SICK AG SICK Lector85x

0
Critical
VulnerabilityCVE-2026-2330cvecve-2026-2330cwe-552
Published: Fri Mar 06 2026 (03/06/2026, 07:54:45 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: SICK Lector85x

Description

An attacker may access restricted filesystem areas on the device via the CROWN REST interface due to incomplete whitelist enforcement. Certain directories intended for internal testing were not covered by the whitelist and are accessible without authentication. An unauthenticated attacker could place a manipulated parameter file that becomes active after a reboot, allowing modification of critical device settings, including network configuration and application parameters.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/13/2026, 19:32:40 UTC

Technical Analysis

CVE-2026-2330 is a vulnerability identified in the SICK AG Lector85x series of industrial sensor devices. The root cause is incomplete enforcement of a whitelist on the device's CROWN REST interface, which is intended to restrict access to certain filesystem directories. However, some directories used for internal testing were not included in this whitelist, allowing unauthenticated external attackers to access them. By exploiting this flaw, an attacker can place a manipulated parameter file within these accessible directories. This file becomes active after the device reboots, enabling the attacker to modify critical device settings, including network configurations and application parameters. Such modifications can disrupt normal device operations, potentially causing denial of service or enabling further attacks within the network. The vulnerability does not require any authentication or user interaction, and the attack vector is network-based, making it highly accessible to remote attackers. The CVSS v3.1 base score of 9.4 reflects the critical nature of this vulnerability, with low attack complexity, no privileges required, and high impact on integrity and availability. Although no public exploits have been reported yet, the vulnerability’s characteristics suggest it could be weaponized quickly. The lack of a patch at the time of disclosure increases the urgency for organizations to implement compensating controls.

Potential Impact

The impact of CVE-2026-2330 is significant for organizations deploying SICK Lector85x devices, commonly used in industrial automation, manufacturing, and logistics. Unauthorized modification of device parameters can lead to operational disruptions, including altered network settings that may isolate the device or expose it to further attacks. Manipulation of application parameters could degrade sensor accuracy or functionality, causing process failures or safety hazards. The ability to execute these changes without authentication and remotely increases the risk of widespread exploitation, potentially affecting entire industrial control systems. This could result in production downtime, financial losses, safety incidents, and damage to organizational reputation. Additionally, attackers could leverage compromised devices as footholds for lateral movement within industrial networks, escalating the threat to critical infrastructure. Given the criticality of industrial sensors in automated environments, the vulnerability poses a high risk to operational continuity and safety.

Mitigation Recommendations

Until an official patch is released by SICK AG, organizations should implement strict network segmentation to isolate Lector85x devices from untrusted networks and restrict access to the CROWN REST interface using firewalls or access control lists. Monitoring network traffic for unusual access attempts to the REST interface can help detect exploitation attempts. Device reboots should be controlled and monitored to prevent activation of malicious parameter files. Where possible, disable or restrict access to internal testing directories and audit device configurations regularly. Employ intrusion detection systems tailored for industrial control systems to identify anomalous behavior. Engage with SICK AG for updates on patches or firmware upgrades and plan for immediate deployment once available. Additionally, consider implementing multi-factor authentication or VPN access for management interfaces if supported, to add an additional layer of protection.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
SICK AG
Date Reserved
2026-02-11T09:33:15.947Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69aa89c1c48b3f10ff2e8a7f

Added to database: 3/6/2026, 8:01:05 AM

Last enriched: 3/13/2026, 7:32:40 PM

Last updated: 4/19/2026, 9:56:12 AM

Views: 93

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses