CVE-2022-46834
CVSS V2 None
CVSS V3 None
Description
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU65x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
Overview
- CVE ID
- CVE-2022-46834
- Assigner
- psirt@sick.de
- Vulnerability Status
- Analyzed
- Published Version
- 2022-12-13T16:15:26
- Last Modified Date
- 2022-12-15T20:23:35
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:o:sick:rfu650-10100_firmware:*:*:*:*:*:*:*:* | 1 | OR | 2.21 | |
cpe:2.3:h:sick:rfu650-10100:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:sick:rfu650-10101_firmware:*:*:*:*:*:*:*:* | 1 | OR | 2.21 | |
cpe:2.3:h:sick:rfu650-10101:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:sick:rfu650-10102_firmware:*:*:*:*:*:*:*:* | 1 | OR | 2.21 | |
cpe:2.3:h:sick:rfu650-10102:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:sick:rfu650-10103_firmware:*:*:*:*:*:*:*:* | 1 | OR | 2.21 | |
cpe:2.3:h:sick:rfu650-10103:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:sick:rfu650-10104_firmware:*:*:*:*:*:*:*:* | 1 | OR | 2.21 | |
cpe:2.3:h:sick:rfu650-10104:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:sick:rfu650-10105_firmware:*:*:*:*:*:*:*:* | 1 | OR | 2.21 | |
cpe:2.3:h:sick:rfu650-10105:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:sick:rfu650-10106_firmware:*:*:*:*:*:*:*:* | 1 | OR | 2.21 | |
cpe:2.3:h:sick:rfu650-10106:-:*:*:*:*:*:*:* | 0 | OR |
References
Reference URL | Reference Tags |
---|---|
https://sick.com/psirt |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-46834 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46834 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-12-13 16:18:31 | Added to TrackCVE | |||
2022-12-13 17:22:12 | 2022-12-13T16:15:26.217 | 2022-12-13T16:15:26 | CVE Published Date | updated |
2022-12-13 17:22:12 | 2022-12-13T16:52:00 | CVE Modified Date | updated | |
2022-12-13 17:22:12 | Received | Awaiting Analysis | Vulnerability Status | updated |
2022-12-14 21:14:25 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2022-12-15 21:14:04 | 2022-12-15T20:23:35 | CVE Modified Date | updated | |
2022-12-15 21:14:04 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2022-12-15 21:14:04 | CWE-327 | Weakness Enumeration | new | |
2022-12-15 21:14:05 | CPE Information | updated |