CVE-2022-46833

Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
References
Link Resource
https://sick.com/psirt Vendor Advisory
https://sick.com/psirt Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sick:rfu630-04100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-04100:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:sick:rfu630-04100s01_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-04100s01:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:sick:rfu630-04101_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-04101:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:sick:rfu630-04102_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-04102:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:sick:rfu630-04103_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-04103:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:sick:rfu630-04104_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-04104:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:sick:rfu630-04105_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-04105:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:sick:rfu630-04106_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-04106:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:sick:rfu630-04109_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-04109:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:sick:rfu630-04117_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-04117:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:sick:rfu630-13100s01_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-13100s01:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:sick:rfu630-13101_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-13101:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:sick:rfu630-13102_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-13102:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:sick:rfu630-13103_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-13103:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:sick:rfu630-13104_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-13104:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:sick:rfu630-13105_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-13105:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:sick:rfu630-13106_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-13106:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:sick:rfu630-13107_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-13107:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:sick:rfu630-13108_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-13108:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:sick:rfu630-13110_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-13110:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
cpe:2.3:o:sick:rfu630-13111_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-13111:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
cpe:2.3:o:sick:rfu630-13113_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-13113:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
cpe:2.3:o:sick:rfu630-13114_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-13114:-:*:*:*:*:*:*:*

Configuration 24 (hide)

AND
cpe:2.3:o:sick:rfu630-13115_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:sick:rfu630-13115:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:31

Type Values Removed Values Added
References () https://sick.com/psirtĀ - Vendor Advisory () https://sick.com/psirtĀ - Vendor Advisory

Information

Published : 2022-12-13 16:15

Updated : 2024-11-21 07:31


NVD link : CVE-2022-46833

Mitre link : CVE-2022-46833

CVE.ORG link : CVE-2022-46833


JSON object : View

Products Affected

sick

  • rfu630-04103_firmware
  • rfu630-13103
  • rfu630-13100s01_firmware
  • rfu630-13104_firmware
  • rfu630-04109
  • rfu630-13111
  • rfu630-13115
  • rfu630-04105
  • rfu630-04104
  • rfu630-04100s01_firmware
  • rfu630-13101_firmware
  • rfu630-13107
  • rfu630-04117
  • rfu630-13101
  • rfu630-13108
  • rfu630-04106_firmware
  • rfu630-13110
  • rfu630-13105
  • rfu630-13106
  • rfu630-13113
  • rfu630-04105_firmware
  • rfu630-13103_firmware
  • rfu630-13110_firmware
  • rfu630-13114_firmware
  • rfu630-13106_firmware
  • rfu630-04100_firmware
  • rfu630-13104
  • rfu630-04103
  • rfu630-04102
  • rfu630-13102_firmware
  • rfu630-13114
  • rfu630-13107_firmware
  • rfu630-04101_firmware
  • rfu630-13111_firmware
  • rfu630-04102_firmware
  • rfu630-13108_firmware
  • rfu630-04106
  • rfu630-04101
  • rfu630-04104_firmware
  • rfu630-04117_firmware
  • rfu630-13105_firmware
  • rfu630-04109_firmware
  • rfu630-13115_firmware
  • rfu630-13113_firmware
  • rfu630-13102
  • rfu630-04100s01
  • rfu630-04100
  • rfu630-13100s01
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm