Use of a Broken or Risky Cryptographic Algorithm in SICK RFU61x firmware version <v2.25 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
References
Link | Resource |
---|---|
https://sick.com/psirt | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: SICK AG
Published: 2022-12-13T00:00:00
Updated: 2022-12-13T00:00:00
Reserved: 2022-03-21T00:00:00
Link: CVE-2022-27581
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-12-13T16:15:18.817
Modified: 2022-12-15T17:44:46.970
Link: CVE-2022-27581
JSON object: View
Redhat Information
No data.
CWE