Use of a Broken or Risky Cryptographic Algorithm in SICK RFU62x firmware version < 2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
References
Link Resource
https://sick.com/psirt Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: SICK AG

Published: 2022-12-13T00:00:00

Updated: 2022-12-13T00:00:00

Reserved: 2022-12-08T00:00:00


Link: CVE-2022-46832

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-12-13T16:15:26.107

Modified: 2022-12-15T20:13:44.290


Link: CVE-2022-46832

JSON object: View

cve-icon Redhat Information

No data.

CWE