Use of a Broken or Risky Cryptographic Algorithm in SICK RFU65x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
References
Link | Resource |
---|---|
https://sick.com/psirt | Vendor Advisory |
https://sick.com/psirt | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
21 Nov 2024, 07:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://sick.com/psirtĀ - Vendor Advisory |
Information
Published : 2022-12-13 16:15
Updated : 2024-11-21 07:31
NVD link : CVE-2022-46834
Mitre link : CVE-2022-46834
CVE.ORG link : CVE-2022-46834
JSON object : View
Products Affected
sick
- rfu650-10101
- rfu650-10103
- rfu650-10104
- rfu650-10105
- rfu650-10101_firmware
- rfu650-10103_firmware
- rfu650-10105_firmware
- rfu650-10106_firmware
- rfu650-10104_firmware
- rfu650-10102
- rfu650-10100
- rfu650-10106
- rfu650-10100_firmware
- rfu650-10102_firmware
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm