Vulnerabilities
Vulnerable Software
Sick:  >> Mrs1000  Security Vulnerabilities
An attacker may exploit the use of outdated and weak MAC algorithms in the device’s SSH service to potentially compromise the integrity of the SSH session, allowing manipulation of transmitted data if the attacker can interact with the network traffic.
CVSS Score
6.5
EPSS Score
0.0
Published
2026-02-27
An attacker may exploit the use of weak CBC-based cipher suites in the device’s SSH service to potentially observe or manipulate parts of the encrypted SSH communication, if they are able to intercept or interact with the network traffic.
CVSS Score
6.5
EPSS Score
0.0
Published
2026-02-27


Contact Us

Shodan ® - All rights reserved