First published: Tue Dec 13 2022(Updated: )
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU62x firmware version < 2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
Credit: psirt@sick.de psirt@sick.de
Affected Software | Affected Version | How to fix |
---|---|---|
Sick Rfu620-10100 Firmware | <2.21 | |
Sick Rfu620-10100 | ||
Sick Rfu620-10101 Firmware | <2.21 | |
Sick Rfu620-10101 | ||
Sick Rfu620-10102 Firmware | <2.21 | |
Sick Rfu620-10102 | ||
Sick Rfu620-10103 Firmware | <2.21 | |
Sick Rfu620-10103 | ||
Sick Rfu620-10104 Firmware | <2.21 | |
Sick Rfu620-10104 | ||
Sick Rfu620-10105 Firmware | <2.21 | |
Sick Rfu620-10105 | ||
Sick Rfu620-10107 Firmware | <2.21 | |
Sick Rfu620-10107 | ||
Sick Rfu620-10108 Firmware | <2.21 | |
Sick Rfu620-10108 | ||
Sick Rfu620-10111 Firmware | <2.21 | |
Sick Rfu620-10111 | ||
Sick Rfu620-10114 Firmware | <2.21 | |
Sick Rfu620-10114 | ||
Sick Rfu620-10118 Firmware | <2.21 | |
Sick Rfu620-10118 | ||
Sick Rfu620-10400 Firmware | <2.21 | |
Sick Rfu620-10400 | ||
Sick Rfu620-10401 Firmware | <2.21 | |
Sick Rfu620-10401 | ||
Sick Rfu620-10500 Firmware | <2.21 | |
Sick Rfu620-10500 | ||
Sick Rfu620-10501 Firmware | <2.21 | |
Sick Rfu620-10501 | ||
Sick Rfu620-10503 Firmware | <2.21 | |
Sick Rfu620-10503 | ||
Sick Rfu620-10504 Firmware | <2.21 | |
Sick Rfu620-10504 | ||
Sick Rfu620-10507 Firmware | <2.21 | |
Sick Rfu620-10507 | ||
Sick Rfu620-10508 Firmware | <2.21 | |
Sick Rfu620-10508 | ||
Sick Rfu620-10510 Firmware | <2.21 | |
Sick Rfu620-10510 | ||
Sick Rfu620-10514 Firmware | <2.21 | |
Sick Rfu620-10514 | ||
All of | ||
Sick Rfu620-10100 Firmware | <2.21 | |
Sick Rfu620-10100 | ||
All of | ||
Sick Rfu620-10101 Firmware | <2.21 | |
Sick Rfu620-10101 | ||
All of | ||
Sick Rfu620-10102 Firmware | <2.21 | |
Sick Rfu620-10102 | ||
All of | ||
Sick Rfu620-10103 Firmware | <2.21 | |
Sick Rfu620-10103 | ||
All of | ||
Sick Rfu620-10104 Firmware | <2.21 | |
Sick Rfu620-10104 | ||
All of | ||
Sick Rfu620-10105 Firmware | <2.21 | |
Sick Rfu620-10105 | ||
All of | ||
Sick Rfu620-10107 Firmware | <2.21 | |
Sick Rfu620-10107 | ||
All of | ||
Sick Rfu620-10108 Firmware | <2.21 | |
Sick Rfu620-10108 | ||
All of | ||
Sick Rfu620-10111 Firmware | <2.21 | |
Sick Rfu620-10111 | ||
All of | ||
Sick Rfu620-10114 Firmware | <2.21 | |
Sick Rfu620-10114 | ||
All of | ||
Sick Rfu620-10118 Firmware | <2.21 | |
Sick Rfu620-10118 | ||
All of | ||
Sick Rfu620-10400 Firmware | <2.21 | |
Sick Rfu620-10400 | ||
All of | ||
Sick Rfu620-10401 Firmware | <2.21 | |
Sick Rfu620-10401 | ||
All of | ||
Sick Rfu620-10500 Firmware | <2.21 | |
Sick Rfu620-10500 | ||
All of | ||
Sick Rfu620-10501 Firmware | <2.21 | |
Sick Rfu620-10501 | ||
All of | ||
Sick Rfu620-10503 Firmware | <2.21 | |
Sick Rfu620-10503 | ||
All of | ||
Sick Rfu620-10504 Firmware | <2.21 | |
Sick Rfu620-10504 | ||
All of | ||
Sick Rfu620-10507 Firmware | <2.21 | |
Sick Rfu620-10507 | ||
All of | ||
Sick Rfu620-10508 Firmware | <2.21 | |
Sick Rfu620-10508 | ||
All of | ||
Sick Rfu620-10510 Firmware | <2.21 | |
Sick Rfu620-10510 | ||
All of | ||
Sick Rfu620-10514 Firmware | <2.21 | |
Sick Rfu620-10514 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-46832 is a vulnerability in the SICK RFU62x firmware version < 2.21 that allows a low-privileged remote attacker to decrypt encrypted data if weak cipher suites are used.
CVE-2022-46832 has a severity rating of 6.5 (Medium).
CVE-2022-46832 affects SICK RFU62x firmware versions prior to 2.21.
To fix CVE-2022-46832, apply the patch and firmware version 2.21 or above for the SICK RFU62x firmware.
More information about CVE-2022-46832 can be found at the SICK Product Security Incident Response Team (PSIRT) website: [https://sick.com/psirt](https://sick.com/psirt)