Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Sick
Subscribe
|
Rfu630-04100
Subscribe
Rfu630-04100 Firmware
Subscribe
Rfu630-04100s01
Subscribe
Rfu630-04100s01 Firmware
Subscribe
Rfu630-04101
Subscribe
Rfu630-04101 Firmware
Subscribe
Rfu630-04102
Subscribe
Rfu630-04102 Firmware
Subscribe
Rfu630-04103
Subscribe
Rfu630-04103 Firmware
Subscribe
Rfu630-04104
Subscribe
Rfu630-04104 Firmware
Subscribe
Rfu630-04105
Subscribe
Rfu630-04105 Firmware
Subscribe
Rfu630-04106
Subscribe
Rfu630-04106 Firmware
Subscribe
Rfu630-04109
Subscribe
Rfu630-04109 Firmware
Subscribe
Rfu630-04117
Subscribe
Rfu630-04117 Firmware
Subscribe
Rfu630-13100s01
Subscribe
Rfu630-13100s01 Firmware
Subscribe
Rfu630-13101
Subscribe
Rfu630-13101 Firmware
Subscribe
Rfu630-13102
Subscribe
Rfu630-13102 Firmware
Subscribe
Rfu630-13103
Subscribe
Rfu630-13103 Firmware
Subscribe
Rfu630-13104
Subscribe
Rfu630-13104 Firmware
Subscribe
Rfu630-13105
Subscribe
Rfu630-13105 Firmware
Subscribe
Rfu630-13106
Subscribe
Rfu630-13106 Firmware
Subscribe
Rfu630-13107
Subscribe
Rfu630-13107 Firmware
Subscribe
Rfu630-13108
Subscribe
Rfu630-13108 Firmware
Subscribe
Rfu630-13110
Subscribe
Rfu630-13110 Firmware
Subscribe
Rfu630-13111
Subscribe
Rfu630-13111 Firmware
Subscribe
Rfu630-13113
Subscribe
Rfu630-13113 Firmware
Subscribe
Rfu630-13114
Subscribe
Rfu630-13114 Firmware
Subscribe
Rfu630-13115
Subscribe
Rfu630-13115 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-49615 | Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://sick.com/psirt |
|
History
Tue, 22 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SICK AG
Published:
Updated: 2025-04-22T14:30:31.109Z
Reserved: 2022-12-08T00:00:00.000Z
Link: CVE-2022-46833
Updated: 2024-08-03T14:39:38.728Z
Status : Modified
Published: 2022-12-13T16:15:26.160
Modified: 2025-04-22T15:16:07.727
Link: CVE-2022-46833
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD