Vulnerability Details CVE-2022-27581
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU61x firmware version <v2.25 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 25.9%
CVSS Severity
CVSS v3 Score 6.5
Products affected by CVE-2022-27581
-
cpe:2.3:h:sick:rfu610-10600:-
-
cpe:2.3:h:sick:rfu610-10601:-
-
cpe:2.3:h:sick:rfu610-10603:-
-
cpe:2.3:h:sick:rfu610-10604:-
-
cpe:2.3:h:sick:rfu610-10605:-
-
cpe:2.3:h:sick:rfu610-10607:-
-
cpe:2.3:h:sick:rfu610-10609:-
-
cpe:2.3:h:sick:rfu610-10610:-
-
cpe:2.3:h:sick:rfu610-10613:-
-
cpe:2.3:h:sick:rfu610-10614:-
-
cpe:2.3:h:sick:rfu610-10618:-
-
cpe:2.3:h:sick:rfu610-10700:-
-
cpe:2.3:o:sick:rfu610-10600_firmware:-
-
cpe:2.3:o:sick:rfu610-10601_firmware:-
-
cpe:2.3:o:sick:rfu610-10603_firmware:-
-
cpe:2.3:o:sick:rfu610-10604_firmware:-
-
cpe:2.3:o:sick:rfu610-10605_firmware:-
-
cpe:2.3:o:sick:rfu610-10607_firmware:-
-
cpe:2.3:o:sick:rfu610-10609_firmware:-
-
cpe:2.3:o:sick:rfu610-10610_firmware:-
-
cpe:2.3:o:sick:rfu610-10613_firmware:-
-
cpe:2.3:o:sick:rfu610-10614_firmware:-
-
cpe:2.3:o:sick:rfu610-10618_firmware:-
-
cpe:2.3:o:sick:rfu610-10700_firmware:-