Impact
The vulnerability is caused by the use of outdated and weak MAC algorithms in the SSH service. An attacker who can observe network traffic may alter the integrity of SSH sessions, modifying transmitted commands or data without detection.
Affected Systems
SICK AG’s LMS1000 and MRS1000 hardware devices are affected. All firmware releases prior to 2.4.1 contain the weakness; the vendor recommends upgrading to release 2.4.1 or later.
Risk and Exploitability
The CVSS score of 6.5 indicates a medium severity impact, while the EPSS score of less than 1% signals a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers that can intercept SSH traffic—either via local network connections or compromised intermediate network devices—could exploit the weak MACs to tamper with data. The risk is mitigated if SSH access is strictly controlled, but the potential for undetected manipulation remains for exposed systems.
OpenCVE Enrichment