Description
Improper validation of a login parameter may allow attackers to redirect users to malicious websites after authentication. This can lead to various risk including stealing credentials from unsuspecting users.
Published: 2026-01-15
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Open Redirect leading to phishing and credential theft
Action: Patch
AI Analysis

Impact

This vulnerability arises from the improper validation of a login parameter. An attacker can supply a crafted URL that, after the user authenticates, redirects them to a malicious site. The lack of validation allows the attacker to execute phishing attacks or otherwise capture credentials from unsuspecting users. The weakness maps to CWE‑601, an open redirect flaw.

Affected Systems

SICK AG TDC‑X401GL devices using firmware versions prior to 1.5.0 are affected. The issue is present in both the hardware and firmware components of the product as listed in the CPE taxonomy.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate impact, while the EPSS score of less than 1% shows a low likelihood of exploitation at this time. The vulnerability is not currently listed in the CISA KEV catalog. An attacker would need the ability to reach the device’s login interface; after successful authentication, the open redirect can be leveraged to deliver phishing content. Because the flaw exists after normal user login, the potential for credential theft remains significant if users are tricked into submitting sensitive information to the redirect target.

Generated by OpenCVE AI on April 18, 2026 at 06:10 UTC.

Remediation

Vendor Solution

Users are strongly recommended to upgrade to the latest release of TDC-X401GL (>= 1.5.0).


OpenCVE Recommended Actions

  • Apply the vendor’s patch by upgrading the TDC‑X401GL firmware to version 1.5.0 or later.
  • If an immediate upgrade is not possible, disable or remove the vulnerable login parameter that allows external redirects in the device configuration.
  • Implement monitoring to detect open‑redirect attempts and block any redirect URLs that do not belong to the legitimate system domain.

Generated by OpenCVE AI on April 18, 2026 at 06:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 06:30:00 +0000

Type Values Removed Values Added
Title Open Redirect in SICK AG TDC‑X401GL Login

Fri, 23 Jan 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Sick
Sick tdc-x401gl
Sick tdc-x401gl Firmware
CPEs cpe:2.3:h:sick:tdc-x401gl:-:*:*:*:*:*:*:*
cpe:2.3:o:sick:tdc-x401gl_firmware:*:*:*:*:*:*:*:*
Vendors & Products Sick
Sick tdc-x401gl
Sick tdc-x401gl Firmware

Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Sick Ag
Sick Ag tdc-x401gl
Vendors & Products Sick Ag
Sick Ag tdc-x401gl

Thu, 15 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 Jan 2026 13:15:00 +0000

Type Values Removed Values Added
Description Improper validation of a login parameter may allow attackers to redirect users to malicious websites after authentication. This can lead to various risk including stealing credentials from unsuspecting users.
Weaknesses CWE-601
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}


Subscriptions

Sick Tdc-x401gl Tdc-x401gl Firmware
Sick Ag Tdc-x401gl
cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2026-01-15T16:37:41.596Z

Reserved: 2026-01-13T09:11:11.448Z

Link: CVE-2026-22912

cve-icon Vulnrichment

Updated: 2026-01-15T16:37:39.140Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-15T13:16:05.960

Modified: 2026-01-23T15:33:27.917

Link: CVE-2026-22912

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T06:15:15Z

Weaknesses