Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
References
Link Resource
https://sick.com/psirt Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: SICK AG

Published: 2022-12-13T00:00:00

Updated: 2022-12-13T00:00:00

Reserved: 2022-12-08T00:00:00


Link: CVE-2022-46833

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-12-13T16:15:26.160

Modified: 2022-12-15T20:23:12.010


Link: CVE-2022-46833

JSON object: View

cve-icon Redhat Information

No data.

CWE