Use of a Broken or Risky Cryptographic Algorithm in SICK RFU62x firmware version < 2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.

Project Subscriptions

Vendors Products
Rfu620-10100 Subscribe
Rfu620-10100 Firmware Subscribe
Rfu620-10101 Subscribe
Rfu620-10101 Firmware Subscribe
Rfu620-10102 Subscribe
Rfu620-10102 Firmware Subscribe
Rfu620-10103 Subscribe
Rfu620-10103 Firmware Subscribe
Rfu620-10104 Subscribe
Rfu620-10104 Firmware Subscribe
Rfu620-10105 Subscribe
Rfu620-10105 Firmware Subscribe
Rfu620-10107 Subscribe
Rfu620-10107 Firmware Subscribe
Rfu620-10108 Subscribe
Rfu620-10108 Firmware Subscribe
Rfu620-10111 Subscribe
Rfu620-10111 Firmware Subscribe
Rfu620-10114 Subscribe
Rfu620-10114 Firmware Subscribe
Rfu620-10118 Subscribe
Rfu620-10118 Firmware Subscribe
Rfu620-10400 Subscribe
Rfu620-10400 Firmware Subscribe
Rfu620-10401 Subscribe
Rfu620-10401 Firmware Subscribe
Rfu620-10500 Subscribe
Rfu620-10500 Firmware Subscribe
Rfu620-10501 Subscribe
Rfu620-10501 Firmware Subscribe
Rfu620-10503 Subscribe
Rfu620-10503 Firmware Subscribe
Rfu620-10504 Subscribe
Rfu620-10504 Firmware Subscribe
Rfu620-10507 Subscribe
Rfu620-10507 Firmware Subscribe
Rfu620-10508 Subscribe
Rfu620-10508 Firmware Subscribe
Rfu620-10510 Subscribe
Rfu620-10510 Firmware Subscribe
Rfu620-10514 Subscribe
Rfu620-10514 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-49614 Use of a Broken or Risky Cryptographic Algorithm in SICK RFU62x firmware version < 2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
https://sick.com/psirt cve-icon cve-icon
History

Mon, 21 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2025-04-21T15:40:10.356Z

Reserved: 2022-12-08T00:00:00.000Z

Link: CVE-2022-46832

cve-icon Vulnrichment

Updated: 2024-08-03T14:39:38.773Z

cve-icon NVD

Status : Modified

Published: 2022-12-13T16:15:26.107

Modified: 2025-04-21T16:15:53.493

Link: CVE-2022-46832

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses