Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.

Project Subscriptions

Vendors Products
Rfu630-04100 Subscribe
Rfu630-04100 Firmware Subscribe
Rfu630-04100s01 Subscribe
Rfu630-04100s01 Firmware Subscribe
Rfu630-04101 Subscribe
Rfu630-04101 Firmware Subscribe
Rfu630-04102 Subscribe
Rfu630-04102 Firmware Subscribe
Rfu630-04103 Subscribe
Rfu630-04103 Firmware Subscribe
Rfu630-04104 Subscribe
Rfu630-04104 Firmware Subscribe
Rfu630-04105 Subscribe
Rfu630-04105 Firmware Subscribe
Rfu630-04106 Subscribe
Rfu630-04106 Firmware Subscribe
Rfu630-04109 Subscribe
Rfu630-04109 Firmware Subscribe
Rfu630-04117 Subscribe
Rfu630-04117 Firmware Subscribe
Rfu630-13100s01 Subscribe
Rfu630-13100s01 Firmware Subscribe
Rfu630-13101 Subscribe
Rfu630-13101 Firmware Subscribe
Rfu630-13102 Subscribe
Rfu630-13102 Firmware Subscribe
Rfu630-13103 Subscribe
Rfu630-13103 Firmware Subscribe
Rfu630-13104 Subscribe
Rfu630-13104 Firmware Subscribe
Rfu630-13105 Subscribe
Rfu630-13105 Firmware Subscribe
Rfu630-13106 Subscribe
Rfu630-13106 Firmware Subscribe
Rfu630-13107 Subscribe
Rfu630-13107 Firmware Subscribe
Rfu630-13108 Subscribe
Rfu630-13108 Firmware Subscribe
Rfu630-13110 Subscribe
Rfu630-13110 Firmware Subscribe
Rfu630-13111 Subscribe
Rfu630-13111 Firmware Subscribe
Rfu630-13113 Subscribe
Rfu630-13113 Firmware Subscribe
Rfu630-13114 Subscribe
Rfu630-13114 Firmware Subscribe
Rfu630-13115 Subscribe
Rfu630-13115 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-49615 Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
https://sick.com/psirt cve-icon cve-icon
History

Tue, 22 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SICK AG

Published:

Updated: 2025-04-22T14:30:31.109Z

Reserved: 2022-12-08T00:00:00.000Z

Link: CVE-2022-46833

cve-icon Vulnrichment

Updated: 2024-08-03T14:39:38.728Z

cve-icon NVD

Status : Modified

Published: 2022-12-13T16:15:26.160

Modified: 2025-04-22T15:16:07.727

Link: CVE-2022-46833

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses