Lucene search

K
cve[email protected]CVE-2022-46833
HistoryDec 13, 2022 - 4:15 p.m.

CVE-2022-46833

2022-12-1316:15:26
CWE-327
web.nvd.nist.gov
17
cve-2022-46833
sick rfu63x
firmware
cryptographic algorithm
ssh interface
encryption
patch
installation procedure

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.9%

Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.

Affected configurations

NVD
Node
sickrfu630-04100_firmwareRange<2.21
AND
sickrfu630-04100Match-
Node
sickrfu630-04100s01_firmwareRange<2.21
AND
sickrfu630-04100s01Match-
Node
sickrfu630-04101_firmwareRange<2.21
AND
sickrfu630-04101Match-
Node
sickrfu630-04102_firmwareRange<2.21
AND
sickrfu630-04102Match-
Node
sickrfu630-04103_firmwareRange<2.21
AND
sickrfu630-04103Match-
Node
sickrfu630-04104_firmwareRange<2.21
AND
sickrfu630-04104Match-
Node
sickrfu630-04105_firmwareRange<2.21
AND
sickrfu630-04105Match-
Node
sickrfu630-04106_firmwareRange<2.21
AND
sickrfu630-04106Match-
Node
sickrfu630-04109_firmwareRange<2.21
AND
sickrfu630-04109Match-
Node
sickrfu630-04117_firmwareRange<2.21
AND
sickrfu630-04117Match-
Node
sickrfu630-13100s01_firmwareRange<2.21
AND
sickrfu630-13100s01Match-
Node
sickrfu630-13101_firmwareRange<2.21
AND
sickrfu630-13101Match-
Node
sickrfu630-13102_firmwareRange<2.21
AND
sickrfu630-13102Match-
Node
sickrfu630-13103_firmwareRange<2.21
AND
sickrfu630-13103Match-
Node
sickrfu630-13104_firmwareRange<2.21
AND
sickrfu630-13104Match-
Node
sickrfu630-13105_firmwareRange<2.21
AND
sickrfu630-13105Match-
Node
sickrfu630-13106_firmwareRange<2.21
AND
sickrfu630-13106Match-
Node
sickrfu630-13107_firmwareRange<2.21
AND
sickrfu630-13107Match-
Node
sickrfu630-13108_firmwareRange<2.21
AND
sickrfu630-13108Match-
Node
sickrfu630-13110_firmwareRange<2.21
AND
sickrfu630-13110Match-
Node
sickrfu630-13111_firmwareRange<2.21
AND
sickrfu630-13111Match-
Node
sickrfu630-13113_firmwareRange<2.21
AND
sickrfu630-13113Match-
Node
sickrfu630-13114_firmwareRange<2.21
AND
sickrfu630-13114Match-
Node
sickrfu630-13115_firmwareRange<2.21
AND
sickrfu630-13115Match-

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "SICK RFU63x Firmware",
    "versions": [
      {
        "version": "<v2.21",
        "status": "affected"
      }
    ]
  }
]

References

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.9%

Related for CVE-2022-46833