An attacker may access restricted filesystem areas on the device via the CROWN REST interface due to incomplete whitelist enforcement. Certain directories intended for internal testing were not covered by the whitelist and are accessible without authentication. An unauthenticated attacker could place a manipulated parameter file that becomes active after a reboot, allowing modification of critical device settings, including network configuration and application parameters.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
Users are strongly recommended to upgrade to release version 2.8.0.
Workaround
No workaround given by the vendor.
References
History
Fri, 06 Mar 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker may access restricted filesystem areas on the device via the CROWN REST interface due to incomplete whitelist enforcement. Certain directories intended for internal testing were not covered by the whitelist and are accessible without authentication. An unauthenticated attacker could place a manipulated parameter file that becomes active after a reboot, allowing modification of critical device settings, including network configuration and application parameters. | |
| Title | CVE-2026-2330 | |
| Weaknesses | CWE-552 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2026-03-06T07:54:45.958Z
Reserved: 2026-02-11T09:33:15.947Z
Link: CVE-2026-2330
No data.
Status : Received
Published: 2026-03-06T08:16:27.253
Modified: 2026-03-06T08:16:27.253
Link: CVE-2026-2330
No data.
OpenCVE Enrichment
No data.
Weaknesses