LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-2330 - Vulnerability Analysis

CriticalCVSS: 9.4

Last Updated: March 9, 2026

CROWN - Broken Access Control

Published: March 6, 2026Updated: March 9, 2026Remote Exploitable

Overview

CROWN device contains a broken access control caused by incomplete whitelist enforcement in the REST interface, letting unauthenticated attackers modify critical device settings after reboot, exploit requires no authentication.

Severity & Score

Severity: Critical
CVSS Score: 9.4
EPSS Score: 21.0%(Probability of exploitation in next 30 days)

Impact

Unauthenticated attackers can modify critical device settings, potentially disrupting network and application configurations.

Mitigation

Update to the latest version with proper whitelist enforcement.

Social Media Activity(1 post)

Offensive Sequence
Offensive Sequence
@offseq
Mar 7, 2026

🚨 CRITICAL: CVE-2026-2330 in SICK Lector85x lets remote, unauthenticated attackers modify device configs via the CROWN REST interface. Patch or restrict access now to prevent OT compromise. https://radar.offseq.com/threat/cve-2026-2330-cwe-552-files-or-directories-accessi-493bd9c6 #OffSeq #ICS #Vulnerability #Infosec

View original post

Details

CVE ID
CVE-2026-2330
Severity
Critical
CVSS Score
9.4
Type
broken_access_control
Status
unconfirmed
EPSS
21.0%
Social Posts
1

CWE

  • CWE-552

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

EPSS Score

21.0%Probability of exploitation in the next 30 days