CVE-2022-46834

EUVD-2022-49616
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU65x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CISA-ADPADP
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 20%
Affected Products (NVD)
VendorProductVersion
sickrfu650-10100_firmware
𝑥
< 2.21
sickrfu650-10101_firmware
𝑥
< 2.21
sickrfu650-10102_firmware
𝑥
< 2.21
sickrfu650-10103_firmware
𝑥
< 2.21
sickrfu650-10104_firmware
𝑥
< 2.21
sickrfu650-10105_firmware
𝑥
< 2.21
sickrfu650-10106_firmware
𝑥
< 2.21
𝑥
= Vulnerable software versions