Description
An attacker may exploit the use of outdated and weak MAC algorithms in the device’s SSH service to potentially compromise the integrity of the SSH session, allowing manipulation of transmitted data if the attacker can interact with the network traffic.
Published: 2026-02-27
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Compromise of SSH session integrity, enabling data manipulation
Action: Immediate Upgrade
AI Analysis

Impact

The vulnerability is caused by the use of outdated and weak MAC algorithms in the SSH service. An attacker who can observe network traffic may alter the integrity of SSH sessions, modifying transmitted commands or data without detection.

Affected Systems

SICK AG’s LMS1000 and MRS1000 hardware devices are affected. All firmware releases prior to 2.4.1 contain the weakness; the vendor recommends upgrading to release 2.4.1 or later.

Risk and Exploitability

The CVSS score of 6.5 indicates a medium severity impact, while the EPSS score of less than 1% signals a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers that can intercept SSH traffic—either via local network connections or compromised intermediate network devices—could exploit the weak MACs to tamper with data. The risk is mitigated if SSH access is strictly controlled, but the potential for undetected manipulation remains for exposed systems.

Generated by OpenCVE AI on April 16, 2026 at 15:28 UTC.

Remediation

Vendor Solution

Users are strongly recommended to upgrade to release version 2.4.1.


OpenCVE Recommended Actions

  • Upgrade the LMS1000 and MRS1000 firmware to release 2.4.1 or later
  • Limit SSH access to trusted networks or restrict inbound connections to essential management devices
  • Configure the SSH service to use strong MAC algorithms such as SHA-2 based options and disable deprecated macros

Generated by OpenCVE AI on April 16, 2026 at 15:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
Title Weak MAC Algorithms Compromise SSH Integrity on SICK LMS1000 and MRS1000

Fri, 06 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Sick
Sick lms1000
Sick lms1000 Firmware
Sick mrs1000
Sick mrs1000 Firmware
CPEs cpe:2.3:h:sick:lms1000:-:*:*:*:*:*:*:*
cpe:2.3:h:sick:mrs1000:-:*:*:*:*:*:*:*
cpe:2.3:o:sick:lms1000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:sick:mrs1000_firmware:*:*:*:*:*:*:*:*
Vendors & Products Sick
Sick lms1000
Sick lms1000 Firmware
Sick mrs1000
Sick mrs1000 Firmware

Fri, 27 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Sick Ag
Sick Ag sick Lms1000
Sick Ag sick Mrs1000
Vendors & Products Sick Ag
Sick Ag sick Lms1000
Sick Ag sick Mrs1000

Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
Description An attacker may exploit the use of outdated and weak MAC algorithms in the device’s SSH service to potentially compromise the integrity of the SSH session, allowing manipulation of transmitted data if the attacker can interact with the network traffic.
Weaknesses CWE-327
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}


Subscriptions

Sick Lms1000 Lms1000 Firmware Mrs1000 Mrs1000 Firmware
Sick Ag Sick Lms1000 Sick Mrs1000
cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2026-03-06T18:43:34.200Z

Reserved: 2026-01-29T15:06:30.788Z

Link: CVE-2026-1627

cve-icon Vulnrichment

Updated: 2026-03-06T18:43:28.426Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T09:16:16.050

Modified: 2026-03-05T02:11:28.757

Link: CVE-2026-1627

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:30:06Z

Weaknesses