First published: Mon Jun 28 2021(Updated: )
SICK Visionary-S CX up version 5.21.2.29154R are vulnerable to an Inadequate Encryption Strength vulnerability concerning the internal SSH interface solely used by SICK for recovering returned devices. The use of weak ciphers make it easier for an attacker to break the security that protects information transmitted from the client to the SSH server, assuming the attacker has access to the network on which the device is connected. This can increase the risk that encryption will be compromised, leading to the exposure of sensitive user information and man-in-the-middle attacks.
Credit: psirt@sick.de
Affected Software | Affected Version | How to fix |
---|---|---|
Sick Visionary-s Cx Firmware | <5.21.2.29154r | |
SICK Visionary-S CX |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32496 has a critical severity due to its inadequate encryption strength in the SSH interface.
To fix CVE-2021-32496, you should update the SICK Visionary-S CX firmware to a version beyond 5.21.2.29154R.
CVE-2021-32496 affects SICK Visionary-S CX devices running firmware versions up to 5.21.2.29154R.
CVE-2021-32496 features a vulnerability due to the use of weak ciphers in the internal SSH interface.
Organizations using SICK Visionary-S CX devices with the vulnerable firmware versions are impacted by CVE-2021-32496.