Description
An attacker may gain unauthorized access to the host filesystem, potentially allowing them to read and modify system data.
Published: 2026-01-15
Score: 9.9 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Filesystem Compromise
Action: Patch Immediately
AI Analysis

Impact

An authorization bypass flaw allows an attacker to gain unauthorized access to the host filesystem of SICK AG’s TDC‑X401GL devices, enabling the reading and modification of system data. The weakness is an improper privilege escalation vulnerability (CWE‑266), which can lead to confidentiality and integrity violations and potentially facilitate further system compromise if exploited successfully.

Affected Systems

The vulnerability affects SICK AG’s TDC‑X401GL line of industrial scanners. Users running firmware versions older than 1.4.0 are impacted; the vendor recommends upgrading to any release of 1.4.0 or later to remediate the issue.

Risk and Exploitability

The CVSS score of 9.9 indicates a critical severity, but the EPSS score of less than 1% suggests a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is inferred to be remote. An attacker could exploit a software flaw exposed over the device’s network interface or possibly through a local privileged channel if the device is physically accessed. Successful exploitation would allow the attacker to read and modify files on the host, enabling further privilege escalation, persistence, or sabotage of device operation.

Generated by OpenCVE AI on April 18, 2026 at 06:12 UTC.

Remediation

Vendor Solution

Users are strongly recommended to upgrade to the latest release of TDC-X401GL (>= 1.4.0).


OpenCVE Recommended Actions

  • Update the TDC‑X401GL firmware to version 1.4.0 or later.
  • Remove or disable unused user accounts and ensure only essential users have elevated privileges on the device.
  • Apply network segmentation and restrict the device’s connectivity to trusted sources only.

Generated by OpenCVE AI on April 18, 2026 at 06:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 06:30:00 +0000

Type Values Removed Values Added
Title Unauthorized Access to Host Filesystem via TDC‑X401GL Vulnerability

Fri, 23 Jan 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Sick
Sick tdc-x401gl
Sick tdc-x401gl Firmware
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:h:sick:tdc-x401gl:-:*:*:*:*:*:*:*
cpe:2.3:o:sick:tdc-x401gl_firmware:*:*:*:*:*:*:*:*
Vendors & Products Sick
Sick tdc-x401gl
Sick tdc-x401gl Firmware

Fri, 16 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Sick Ag
Sick Ag tdc-x401gl
Vendors & Products Sick Ag
Sick Ag tdc-x401gl

Thu, 15 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 15 Jan 2026 13:15:00 +0000

Type Values Removed Values Added
Description An attacker may gain unauthorized access to the host filesystem, potentially allowing them to read and modify system data.
Weaknesses CWE-266
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Sick Tdc-x401gl Tdc-x401gl Firmware
Sick Ag Tdc-x401gl
cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2026-01-15T14:43:22.684Z

Reserved: 2026-01-13T09:11:11.447Z

Link: CVE-2026-22907

cve-icon Vulnrichment

Updated: 2026-01-15T14:43:19.046Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-15T13:16:05.263

Modified: 2026-01-23T15:49:41.073

Link: CVE-2026-22907

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T06:15:15Z

Weaknesses