6.5
CVE-2022-27581
- EPSS 0.07%
- Veröffentlicht 13.12.2022 16:15:18
- Zuletzt bearbeitet 22.04.2025 16:15:28
- Quelle psirt@sick.de
- CVE-Watchlists
- Unerledigt
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU61x firmware version <v2.25 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Sick ≫ Rfu610-10600 Firmware Version < 2.25
Sick ≫ Rfu610-10601 Firmware Version < 2.25
Sick ≫ Rfu610-10603 Firmware Version < 2.25
Sick ≫ Rfu610-10604 Firmware Version < 2.25
Sick ≫ Rfu610-10605 Firmware Version < 2.25
Sick ≫ Rfu610-10607 Firmware Version < 2.25
Sick ≫ Rfu610-10609 Firmware Version < 2.25
Sick ≫ Rfu610-10610 Firmware Version < 2.25
Sick ≫ Rfu610-10613 Firmware Version < 2.25
Sick ≫ Rfu610-10614 Firmware Version < 2.25
Sick ≫ Rfu610-10618 Firmware Version < 2.25
Sick ≫ Rfu610-10700 Firmware Version < 2.25
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.21 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
The product uses a broken or risky cryptographic algorithm or protocol.