Impact
The vulnerability enables attackers to invoke system functions that start, stop, or delete installed applications without proper authorization. This lack of access control can lead to service disruption or provide a foothold for further compromise of the device. The impact is limited to the device’s application layer but can severely affect mission‑critical operations that rely on those applications.
Affected Systems
SICK AG’s TDC‑X401GL industrial device is affected. All firmware builds of the TDC‑X401GL are potentially vulnerable, as the vendor does not list specific versions. The device includes an AppEngine component that, when active, exposes the vulnerable management functions.
Risk and Exploitability
The CVSS v3.1 score of 7.5 indicates high severity, while the EPSS value of under 1% suggests a very low but nonzero exploitation probability. The vulnerability is not yet listed in the CISA KEV catalog. A likely attack vector is remote access to the device’s management interface over the network, which can be exploited without special privileges. Exploitation would allow an attacker to control application lifecycles, potentially disrupting availability and enabling persistence on the device.
OpenCVE Enrichment