CVE-2026-22911
BaseFortify
Publication date: 2026-01-15
Last updated on: 2026-01-15
Assigner: SICK AG
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sick_ag | tdc-x401gl | to 1.4.0 (exc) |
| sick_ag | meac300 | * |
| sick_ag | lector8xx | * |
| sick_ag | inspectorp8xx | * |
| sick_ag | dl100-2xxxxxxx | * |
| sick_ag | flexi_compact | * |
| sick_ag | picoscan | * |
| sick_ag | multiscan | * |
| sick_ag | field_analytics | * |
| sick_ag | media_server | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-798 | The product contains hard-coded credentials, such as a password or cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves firmware update files that may expose password hashes for system accounts. This exposure could allow a remote attacker to recover credentials and gain unauthorized access to the affected device.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing a remote attacker to recover system account credentials from exposed password hashes in firmware update files. This unauthorized access could compromise the device's security by allowing the attacker to access the system without permission.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The provided resources do not include specific commands or direct detection methods for this vulnerability. However, general best practices for detecting vulnerabilities in industrial control systems include continuous device inventory, configuration snapshots, and activity monitoring to detect unauthorized changes. Network segmentation and monitoring traffic for unusual access attempts can also help identify exploitation attempts. For detailed detection commands or tools specific to this vulnerability, consulting SICK PSIRT advisories or contacting their support is recommended. [1, 4]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include applying any available firmware updates that address the vulnerability. Although no specific firmware version is mentioned for CVE-2026-22911, general recommendations from SICK for similar vulnerabilities include upgrading to the latest firmware version. Additionally, minimizing network exposure by restricting network access, implementing network segmentation, using firewalls, and following recommended security practices such as those outlined in SICK's cybersecurity operating guidelines can help reduce risk. [1, 4]