An attacker with low privileges may be able to trigger critical system functions such as reboot or factory reset without proper restrictions, potentially leading to service disruption or loss of configuration.
References
| Link | Resource |
|---|---|
| https://sick.com/psirt | Vendor Advisory |
| https://www.cisa.gov/resources-tools/resources/ics-recommended-practices | US Government Resource |
| https://www.first.org/cvss/calculator/3.1 | Not Applicable |
| https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0001.json | Vendor Advisory |
| https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0001.pdf | Vendor Advisory |
| https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-15 13:16
Updated : 2026-01-23 15:13
NVD link : CVE-2026-22916
Mitre link : CVE-2026-22916
CVE.ORG link : CVE-2026-22916
JSON object : View
Products Affected
sick
- tdc-x401gl_firmware
- tdc-x401gl
CWE
