Impact
An authorization bypass flaw allows an attacker to gain unauthorized access to the host filesystem of SICK AG’s TDC‑X401GL devices, enabling the reading and modification of system data. The weakness is an improper privilege escalation vulnerability (CWE‑266), which can lead to confidentiality and integrity violations and potentially facilitate further system compromise if exploited successfully.
Affected Systems
The vulnerability affects SICK AG’s TDC‑X401GL line of industrial scanners. Users running firmware versions older than 1.4.0 are impacted; the vendor recommends upgrading to any release of 1.4.0 or later to remediate the issue.
Risk and Exploitability
The CVSS score of 9.9 indicates a critical severity, but the EPSS score of less than 1% suggests a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is inferred to be remote. An attacker could exploit a software flaw exposed over the device’s network interface or possibly through a local privileged channel if the device is physically accessed. Successful exploitation would allow the attacker to read and modify files on the host, enabling further privilege escalation, persistence, or sabotage of device operation.
OpenCVE Enrichment