Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources "SICK Operating Guidelines" and "ICS-CERT recommended practices on Industrial Security" could help to implement the general security practices.
Fri, 16 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sick Ag
Sick Ag tdc-x401gl |
|
| Vendors & Products |
Sick Ag
Sick Ag tdc-x401gl |
Thu, 15 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 15 Jan 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Firmware update files may expose password hashes for system accounts, which could allow a remote attacker to recover credentials and gain unauthorized access to the device. | |
| Weaknesses | CWE-798 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2026-01-15T14:39:02.055Z
Reserved: 2026-01-13T09:11:11.448Z
Link: CVE-2026-22911
Updated: 2026-01-15T14:38:57.485Z
Status : Awaiting Analysis
Published: 2026-01-15T13:16:05.813
Modified: 2026-01-16T15:55:33.063
Link: CVE-2026-22911
No data.
OpenCVE Enrichment
Updated: 2026-01-16T14:09:09Z