{"id": "CVE-2022-27581", "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 2.8}]}, "published": "2022-12-13T16:15:18.817", "references": [{"url": "https://sick.com/psirt", "tags": ["Vendor Advisory"], "source": "psirt@sick.de"}, {"url": "https://sick.com/psirt", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "psirt@sick.de", "description": [{"lang": "en", "value": "CWE-327"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-327"}]}], "descriptions": [{"lang": "en", "value": "Use of a Broken or Risky Cryptographic Algorithm in SICK RFU61x firmware version <v2.25 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person."}, {"lang": "es", "value": "El uso de un algoritmo criptogr\u00e1fico roto o riesgoso en la versi\u00f3n de firmware SICK RFU61x "}], "lastModified": "2024-11-21T06:55:59.280", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu610-10600_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC000466-9D77-43B0-BADC-5E6B0E2B1957", "versionEndExcluding": "2.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu610-10600:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E35D3B33-EE83-4334-B2EF-15749D66E932"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu610-10601_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76748AF8-788C-416F-B2BC-9A84BA5C7AC4", "versionEndExcluding": "2.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu610-10601:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8D69C972-67F7-4030-B8FE-08C336421BC4"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu610-10603_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71F7B120-1C4E-4677-A930-9AEFE544606B", "versionEndExcluding": "2.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu610-10603:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "64C9CF2D-FF9D-47E6-90DB-00BB61925F4B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu610-10604_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F3F8351-68D5-4E6B-A32E-E2718706B2B1", "versionEndExcluding": "2.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu610-10604:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "076B6B41-400D-47B9-88B7-9DC7D3736652"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu610-10605_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2E067E7-5183-4520-942C-98440C6F1573", "versionEndExcluding": "2.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu610-10605:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8B582823-335F-4E4A-84D9-D2CD0B01CE84"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu610-10607_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "388AA4E0-E70C-4C72-9D20-8A5F439F1984", "versionEndExcluding": "2.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu610-10607:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6C46BEBC-23B0-465C-AC28-07853DD719B8"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu610-10609_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18958BFA-55C3-4139-A192-8D78CBB2DCA3", "versionEndExcluding": "2.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu610-10609:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0E06FA3D-239B-45BF-A1E5-E3A78D66E31F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu610-10610_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BC10C5B-67D3-4A50-A4E0-AD74170DB16B", "versionEndExcluding": "2.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu610-10610:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "569EAD89-2220-434E-8F66-9B860563763A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu610-10613_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51BB7B20-565B-43DE-9D20-62025C95C701", "versionEndExcluding": "2.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu610-10613:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "32247792-4A6D-4401-8CC5-2AAF398772FE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu610-10614_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7B7CBA2-BE18-4637-B719-F9B3DA467C08", "versionEndExcluding": "2.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu610-10614:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "88BF06A2-B622-4477-8BE6-58AE286C1B93"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu610-10618_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F4024C5-DA88-416E-9661-9A5DFF671794", "versionEndExcluding": "2.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu610-10618:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5C24AF73-53E7-401C-BFA4-20B902787F95"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu610-10700_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B082D143-61D7-40B7-AD8A-63C9C0B058A8", "versionEndExcluding": "2.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu610-10700:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FBBCDC86-7CC0-41C1-A34C-A04A6B11E94C"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "psirt@sick.de"}