An attacker may access restricted filesystem areas on the device via the CROWN REST interface due to incomplete whitelist enforcement. Certain directories intended for internal testing were not covered by the whitelist and are accessible without authentication. An unauthenticated attacker could place a manipulated parameter file that becomes active after a reboot, allowing modification of critical device settings, including network configuration and application parameters.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

Users are strongly recommended to upgrade to release version 2.8.0.


Workaround

No workaround given by the vendor.

History

Fri, 06 Mar 2026 08:00:00 +0000

Type Values Removed Values Added
Description An attacker may access restricted filesystem areas on the device via the CROWN REST interface due to incomplete whitelist enforcement. Certain directories intended for internal testing were not covered by the whitelist and are accessible without authentication. An unauthenticated attacker could place a manipulated parameter file that becomes active after a reboot, allowing modification of critical device settings, including network configuration and application parameters.
Title CVE-2026-2330
Weaknesses CWE-552
References
Metrics cvssV3_1

{'score': 9.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2026-03-06T07:54:45.958Z

Reserved: 2026-02-11T09:33:15.947Z

Link: CVE-2026-2330

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-06T08:16:27.253

Modified: 2026-03-06T08:16:27.253

Link: CVE-2026-2330

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses