6.5
CVE-2022-46833
- EPSS 0.07%
- Veröffentlicht 13.12.2022 16:15:26
- Zuletzt bearbeitet 22.04.2025 15:16:07
- Quelle psirt@sick.de
- CVE-Watchlists
- Unerledigt
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Sick ≫ Rfu630-04100 Firmware Version < 2.21
Sick ≫ Rfu630-04100s01 Firmware Version < 2.21
Sick ≫ Rfu630-04101 Firmware Version < 2.21
Sick ≫ Rfu630-04102 Firmware Version < 2.21
Sick ≫ Rfu630-04103 Firmware Version < 2.21
Sick ≫ Rfu630-04104 Firmware Version < 2.21
Sick ≫ Rfu630-04105 Firmware Version < 2.21
Sick ≫ Rfu630-04106 Firmware Version < 2.21
Sick ≫ Rfu630-04109 Firmware Version < 2.21
Sick ≫ Rfu630-04117 Firmware Version < 2.21
Sick ≫ Rfu630-13100s01 Firmware Version < 2.21
Sick ≫ Rfu630-13101 Firmware Version < 2.21
Sick ≫ Rfu630-13102 Firmware Version < 2.21
Sick ≫ Rfu630-13103 Firmware Version < 2.21
Sick ≫ Rfu630-13104 Firmware Version < 2.21
Sick ≫ Rfu630-13105 Firmware Version < 2.21
Sick ≫ Rfu630-13106 Firmware Version < 2.21
Sick ≫ Rfu630-13107 Firmware Version < 2.21
Sick ≫ Rfu630-13108 Firmware Version < 2.21
Sick ≫ Rfu630-13110 Firmware Version < 2.21
Sick ≫ Rfu630-13111 Firmware Version < 2.21
Sick ≫ Rfu630-13113 Firmware Version < 2.21
Sick ≫ Rfu630-13114 Firmware Version < 2.21
Sick ≫ Rfu630-13115 Firmware Version < 2.21
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.21 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
The product uses a broken or risky cryptographic algorithm or protocol.