First published: Tue Dec 13 2022(Updated: )
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
Credit: psirt@sick.de psirt@sick.de
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Sick Rfu630 Firmware | <2.21 | |
Sick RFU630 | ||
All of | ||
Sick Rfu630-04100s01 | <2.21 | |
Sick RFU630 | ||
All of | ||
Sick RFU630-04101 Firmware | <2.21 | |
Sick RFU630 | ||
All of | ||
Sick RFU630 Firmware | <2.21 | |
Sick Rfu630-04102 Firmware | ||
All of | ||
Sick Rfu630 Firmware | <2.21 | |
Sick RFU630 | ||
All of | ||
Sick RFU630-04104 | <2.21 | |
Sick RFU630 | ||
All of | ||
Sick RFU630-04105 | <2.21 | |
Sick RFU630 | ||
All of | ||
Sick RFU630 Firmware | <2.21 | |
Sick RFU630-04106 Firmware | ||
All of | ||
Sick RFU630 | <2.21 | |
Sick RFU630 | ||
All of | ||
Sick RFU630 | <2.21 | |
Sick Rfu630-04117 Firmware | ||
All of | ||
Sick RFU630-13100S01 | <2.21 | |
Sick RFU630 | ||
All of | ||
Sick RFU630 | <2.21 | |
Sick RFU630 | ||
All of | ||
Sick Rfu630 Firmware | <2.21 | |
Sick RFU630 | ||
All of | ||
Sick RFU630 Firmware | <2.21 | |
Sick RFU630-13103 Firmware | ||
All of | ||
Sick RFU630 | <2.21 | |
Sick RFU630 | ||
All of | ||
Sick RFU630 | <2.21 | |
Sick Rfu630-13105 Firmware | ||
All of | ||
Sick Rfu630 Firmware | <2.21 | |
Sick Rfu630-13106 Firmware | ||
All of | ||
Sick RFU630-13107 | <2.21 | |
Sick RFU630 | ||
All of | ||
Sick RFU630 Firmware | <2.21 | |
Sick Rfu630-13108 Firmware | ||
All of | ||
Sick RFU630 Firmware | <2.21 | |
Sick RFU630-13110 Firmware | ||
All of | ||
Sick Rfu630-13111 | <2.21 | |
Sick RFU630 | ||
All of | ||
Sick RFU630-13113 | <2.21 | |
Sick RFU630 | ||
All of | ||
Sick RFU630 Firmware | <2.21 | |
Sick RFU630 | ||
All of | ||
Sick RFU630-13115 Firmware | <2.21 | |
Sick RFU630 | ||
Sick Rfu630 Firmware | <2.21 | |
Sick RFU630 | ||
Sick Rfu630-04100s01 | <2.21 | |
Sick RFU630 | ||
Sick RFU630-04101 Firmware | <2.21 | |
Sick RFU630 | ||
Sick RFU630 Firmware | <2.21 | |
Sick Rfu630-04102 Firmware | ||
Sick Rfu630 Firmware | <2.21 | |
Sick RFU630 | ||
Sick RFU630-04104 | <2.21 | |
Sick RFU630 | ||
Sick RFU630-04105 | <2.21 | |
Sick RFU630 | ||
Sick RFU630 Firmware | <2.21 | |
Sick RFU630-04106 Firmware | ||
Sick RFU630 | <2.21 | |
Sick RFU630 | ||
Sick RFU630 | <2.21 | |
Sick Rfu630-04117 Firmware | ||
Sick RFU630-13100S01 | <2.21 | |
Sick RFU630 | ||
Sick RFU630 | <2.21 | |
Sick RFU630 | ||
Sick Rfu630 Firmware | <2.21 | |
Sick RFU630 | ||
Sick RFU630 Firmware | <2.21 | |
Sick RFU630-13103 Firmware | ||
Sick RFU630 | <2.21 | |
Sick RFU630 | ||
Sick RFU630 | <2.21 | |
Sick Rfu630-13105 Firmware | ||
Sick Rfu630 Firmware | <2.21 | |
Sick Rfu630-13106 Firmware | ||
Sick RFU630-13107 | <2.21 | |
Sick RFU630 | ||
Sick RFU630 Firmware | <2.21 | |
Sick Rfu630-13108 Firmware | ||
Sick RFU630 Firmware | <2.21 | |
Sick RFU630-13110 Firmware | ||
Sick Rfu630-13111 | <2.21 | |
Sick RFU630 | ||
Sick RFU630-13113 | <2.21 | |
Sick RFU630 | ||
Sick RFU630 Firmware | <2.21 | |
Sick RFU630 | ||
Sick RFU630-13115 Firmware | <2.21 | |
Sick RFU630 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-46833 is a vulnerability related to the use of a broken or risky cryptographic algorithm in SICK RFU63x firmware version < v2.21.
CVE-2022-46833 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface.
Once the data is decrypted, the attacker may be able to access sensitive information or further exploit the system.
CVE-2022-46833 has a severity rating of 6.5 (medium).
To fix CVE-2022-46833, users should apply the patch and installation procedure provided by SICK for firmware version v2.21 or higher.