Use of a Broken or Risky Cryptographic Algorithm in SICK RFU65x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://sick.com/psirt |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2024-08-03T14:39:39.119Z
Reserved: 2022-12-08T00:00:00
Link: CVE-2022-46834

No data.

Status : Modified
Published: 2022-12-13T16:15:26.217
Modified: 2024-11-21T07:31:08.637
Link: CVE-2022-46834

No data.