CVE-2022-46832
moderate-risk
Published 2022-12-13
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU62x firmware version < 2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
Do I need to act?
-
0.07% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Products (20)
Rfu620-10100 Firmware
Rfu620-10101 Firmware
Rfu620-10102 Firmware
Rfu620-10103 Firmware
Rfu620-10104 Firmware
Rfu620-10105 Firmware
Rfu620-10107 Firmware
Rfu620-10108 Firmware
Rfu620-10111 Firmware
Rfu620-10114 Firmware
Rfu620-10118 Firmware
Rfu620-10400 Firmware
Rfu620-10401 Firmware
Rfu620-10500 Firmware
Rfu620-10501 Firmware
Rfu620-10503 Firmware
Rfu620-10504 Firmware
Rfu620-10507 Firmware
Rfu620-10508 Firmware
Rfu620-10510 Firmware
Affected Vendors
References (2)
Vendor Advisory
https://sick.com/psirt
Vendor Advisory
https://sick.com/psirt
44
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
0/34 · Minimal
Exposure
20/34 · Moderate