Use of a Broken or Risky Cryptographic Algorithm in SICK RFU65x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-49616 | Use of a Broken or Risky Cryptographic Algorithm in SICK RFU65x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://sick.com/psirt |
|
History
Tue, 22 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-04-22T14:28:17.645Z
Reserved: 2022-12-08T00:00:00.000Z
Link: CVE-2022-46834
Updated: 2024-08-03T14:39:39.119Z
Status : Modified
Published: 2022-12-13T16:15:26.217
Modified: 2025-04-22T15:16:07.967
Link: CVE-2022-46834
No data.
OpenCVE Enrichment
No data.
EUVD