Impact
The vulnerability resides in the use of weak, publicly known default passwords for hidden user accounts on the SICK AG TDC‑X401GL device. This flaw allows an attacker to gain unauthorized access to privileged system functions, potentially modifying configurations or breaching the integrity of the device. The weakness is classified as CWE‑1391, a credential management issue that can lead to privilege escalation within the device’s administrative scope.
Affected Systems
The TDC‑X401GL model from SICK AG is affected. No specific firmware versions are listed, so all versions of the product with the default credentials remain susceptible until a patch or firmware update is applied.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity, yet the EPSS score is below 1% and the vulnerability is not currently present in CISA’s KEV catalog, suggesting a low likelihood of exploitation. The likely attack vector involves remote credential theft or brute‑force using known default passwords, which does not require local access. Since no official patch is available, the only viable mitigation relies on the vendor-specified workaround. The risk level is therefore moderate, dependent on the presence of exposed default credentials.
OpenCVE Enrichment