An attacker may access restricted filesystem areas on the device via the CROWN REST interface due to incomplete whitelist enforcement. Certain directories intended for internal testing were not covered by the whitelist and are accessible without authentication. An unauthenticated attacker could place a manipulated parameter file that becomes active after a reboot, allowing modification of critical device settings, including network configuration and application parameters.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Mar 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker may access restricted filesystem areas on the device via the CROWN REST interface due to incomplete whitelist enforcement. Certain directories intended for internal testing were not covered by the whitelist and are accessible without authentication. An unauthenticated attacker could place a manipulated parameter file that becomes active after a reboot, allowing modification of critical device settings, including network configuration and application parameters. | |
| Title | CVE-2026-2330 | |
| Weaknesses | CWE-552 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SICK AG
Published: 2026-03-06T07:54:45.958Z
Updated: 2026-03-06T07:54:45.958Z
Reserved: 2026-02-11T09:33:15.947Z
Link: CVE-2026-2330
No data.
Status : Received
Published: 2026-03-06T08:16:27.253
Modified: 2026-03-06T08:16:27.253
Link: CVE-2026-2330
No data.