Cyber Posture

CVE-2026-22908

Critical

Published: 15 January 2026

Published
15 January 2026
Modified
23 January 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0003 9.1th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22908 is a critical-severity Incorrect Privilege Assignment (CWE-266) vulnerability in Sick Tdc-X401Gl Firmware. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Implant Internal Image (T1525); ranked at the 9.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-3 (Malicious Code Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Implant Internal Image (T1525) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates validation of uploaded container images to ensure they are accurate, complete, and free from malicious content, preventing system compromise.

preventdetect

Deploys malicious code protection mechanisms at network boundaries and within the system to scan and block harmful container images during upload.

prevent

Requires integrity checks on software components like container images to detect unauthorized modifications or insertions before execution.

MITRE ATT&CK Enterprise TechniquesAI

T1525 Implant Internal Image Persistence
Adversaries may implant cloud or container images with malicious code to establish persistence after gaining access to an environment.
T1610 Deploy Container Execution
Adversaries may deploy a container into an environment to facilitate execution or evade defenses.
Why these techniques?

Vulnerability directly allows upload of malicious/unvalidated container images leading to full system compromise, mapping to implanting internal images and container deployment.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Uploading unvalidated container images may allow remote attackers to gain full access to the system, potentially compromising its integrity and confidentiality.

Deeper analysisAI

CVE-2026-22908 is a high-severity vulnerability (CVSS 9.1, CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) published on 2026-01-15, stemming from the uploading of unvalidated container images. This flaw, linked to CWE-266 and NVD-CWE-noinfo, affects components from SICK, as detailed in the vendor's PSIRT advisories and CSAF documents (sca-2026-0001). It enables remote attackers to gain full access to the system, potentially compromising its integrity and confidentiality.

Attackers require high privileges (PR:H) to exploit this over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N). Successful exploitation changes scope (S:C), resulting in high impacts across confidentiality, integrity, and availability (C:H/I:H/A:H), allowing full system compromise through malicious container images.

Mitigation guidance is available in SICK's PSIRT page (https://sick.com/psirt) and CSAF advisories (https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0001.json and .pdf). Additional ICS recommended practices from CISA (https://www.cisa.gov/resources-tools/resources/ics-recommended-practices) may apply, with CVSS details at https://www.first.org/cvss/calculator/3.1.

Details

CWE(s)

Affected Products

sick
tdc-x401gl firmware
≤ 1.4.0

CVEs Like This One

CVE-2026-22907Same product: Sick Tdc-X401Gl
CVE-2026-22910Same product: Sick Tdc-X401Gl
CVE-2026-22920Same product: Sick Tdc-X401Gl
CVE-2026-22918Same product: Sick Tdc-X401Gl
CVE-2026-22917Same product: Sick Tdc-X401Gl
CVE-2026-22911Same product: Sick Tdc-X401Gl
CVE-2026-22909Same product: Sick Tdc-X401Gl
CVE-2026-1626Same vendor: Sick
CVE-2026-22644Same vendor: Sick
CVE-2025-58587Same vendor: Sick

References