CVE-2026-22908
Published: 15 January 2026
Summary
CVE-2026-22908 is a critical-severity Incorrect Privilege Assignment (CWE-266) vulnerability in Sick Tdc-X401Gl Firmware. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Implant Internal Image (T1525); ranked at the 9.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-3 (Malicious Code Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates validation of uploaded container images to ensure they are accurate, complete, and free from malicious content, preventing system compromise.
Deploys malicious code protection mechanisms at network boundaries and within the system to scan and block harmful container images during upload.
Requires integrity checks on software components like container images to detect unauthorized modifications or insertions before execution.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability directly allows upload of malicious/unvalidated container images leading to full system compromise, mapping to implanting internal images and container deployment.
NVD Description
Uploading unvalidated container images may allow remote attackers to gain full access to the system, potentially compromising its integrity and confidentiality.
Deeper analysisAI
CVE-2026-22908 is a high-severity vulnerability (CVSS 9.1, CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) published on 2026-01-15, stemming from the uploading of unvalidated container images. This flaw, linked to CWE-266 and NVD-CWE-noinfo, affects components from SICK, as detailed in the vendor's PSIRT advisories and CSAF documents (sca-2026-0001). It enables remote attackers to gain full access to the system, potentially compromising its integrity and confidentiality.
Attackers require high privileges (PR:H) to exploit this over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N). Successful exploitation changes scope (S:C), resulting in high impacts across confidentiality, integrity, and availability (C:H/I:H/A:H), allowing full system compromise through malicious container images.
Mitigation guidance is available in SICK's PSIRT page (https://sick.com/psirt) and CSAF advisories (https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0001.json and .pdf). Additional ICS recommended practices from CISA (https://www.cisa.gov/resources-tools/resources/ics-recommended-practices) may apply, with CVSS details at https://www.first.org/cvss/calculator/3.1.
Details
- CWE(s)