Impact
SICK AG products LMS1000 and MRS1000 expose weak CBC‑based cipher suites in their SSH service, a flaw classified as CWE‑327. An attacker who can intercept or interact with the network traffic may observe portions of the encrypted SSH communication or insert malicious payloads into the data stream. The vulnerability does not grant immediate remote code execution but undermines the confidentiality and integrity of the SSH channel.
Affected Systems
The affected devices are SICK AG’s LMS1000 and MRS1000 line of safety‑related equipment, specifically the firmware components of these models. Users should verify the firmware version and apply the vendor‑recommended update to release 2.4.1, which removes the vulnerable cipher suites.
Risk and Exploitability
The CVSS score of 6.5 indicates a moderate risk, while the EPSS score of less than 1% points to a low probability of exploitation in the wild. The vulnerability is not listed as a Known Exploited Vulnerability. The likely attack vector requires an attacker to be on the same network segment to intercept SSH traffic or to have some level of connectivity to the device’s SSH service. Because the issue is limited to cryptographic misconfiguration rather than a code logic flaw, the likelihood of successful exploitation remains modest but the potential impact on sensitive safety‑engineered communications warrants timely mitigation.
OpenCVE Enrichment