6.5
CVE-2022-46834
- EPSS 0.07%
- Veröffentlicht 13.12.2022 16:15:26
- Zuletzt bearbeitet 22.04.2025 15:16:07
- Quelle psirt@sick.de
- CVE-Watchlists
- Unerledigt
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU65x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Sick ≫ Rfu650-10100 Firmware Version < 2.21
Sick ≫ Rfu650-10101 Firmware Version < 2.21
Sick ≫ Rfu650-10102 Firmware Version < 2.21
Sick ≫ Rfu650-10103 Firmware Version < 2.21
Sick ≫ Rfu650-10104 Firmware Version < 2.21
Sick ≫ Rfu650-10105 Firmware Version < 2.21
Sick ≫ Rfu650-10106 Firmware Version < 2.21
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.21 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
The product uses a broken or risky cryptographic algorithm or protocol.