First published: Tue Dec 13 2022(Updated: )
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
Credit: psirt@sick.de psirt@sick.de
Affected Software | Affected Version | How to fix |
---|---|---|
Sick Rfu630-04100 Firmware | <2.21 | |
Sick Rfu630-04100 | ||
Sick Rfu630-04100s01 Firmware | <2.21 | |
Sick Rfu630-04100s01 | ||
Sick Rfu630-04101 Firmware | <2.21 | |
Sick Rfu630-04101 | ||
Sick Rfu630-04102 Firmware | <2.21 | |
Sick Rfu630-04102 | ||
Sick Rfu630-04103 Firmware | <2.21 | |
Sick Rfu630-04103 | ||
Sick Rfu630-04104 Firmware | <2.21 | |
Sick Rfu630-04104 | ||
Sick Rfu630-04105 Firmware | <2.21 | |
Sick Rfu630-04105 | ||
Sick Rfu630-04106 Firmware | <2.21 | |
Sick Rfu630-04106 | ||
Sick Rfu630-04109 Firmware | <2.21 | |
Sick Rfu630-04109 | ||
Sick Rfu630-04117 Firmware | <2.21 | |
Sick Rfu630-04117 | ||
Sick Rfu630-13100s01 Firmware | <2.21 | |
Sick Rfu630-13100s01 | ||
Sick Rfu630-13101 Firmware | <2.21 | |
Sick Rfu630-13101 | ||
Sick Rfu630-13102 Firmware | <2.21 | |
Sick Rfu630-13102 | ||
Sick Rfu630-13103 Firmware | <2.21 | |
Sick Rfu630-13103 | ||
Sick Rfu630-13104 Firmware | <2.21 | |
Sick Rfu630-13104 | ||
Sick Rfu630-13105 Firmware | <2.21 | |
Sick Rfu630-13105 | ||
Sick Rfu630-13106 Firmware | <2.21 | |
Sick Rfu630-13106 | ||
Sick Rfu630-13107 Firmware | <2.21 | |
Sick Rfu630-13107 | ||
Sick Rfu630-13108 Firmware | <2.21 | |
Sick Rfu630-13108 | ||
Sick Rfu630-13110 Firmware | <2.21 | |
Sick Rfu630-13110 | ||
Sick Rfu630-13111 Firmware | <2.21 | |
Sick Rfu630-13111 | ||
Sick Rfu630-13113 Firmware | <2.21 | |
Sick Rfu630-13113 | ||
Sick Rfu630-13114 Firmware | <2.21 | |
Sick Rfu630-13114 | ||
Sick Rfu630-13115 Firmware | <2.21 | |
Sick Rfu630-13115 | ||
All of | ||
Sick Rfu630-04100 Firmware | <2.21 | |
Sick Rfu630-04100 | ||
All of | ||
Sick Rfu630-04100s01 Firmware | <2.21 | |
Sick Rfu630-04100s01 | ||
All of | ||
Sick Rfu630-04101 Firmware | <2.21 | |
Sick Rfu630-04101 | ||
All of | ||
Sick Rfu630-04102 Firmware | <2.21 | |
Sick Rfu630-04102 | ||
All of | ||
Sick Rfu630-04103 Firmware | <2.21 | |
Sick Rfu630-04103 | ||
All of | ||
Sick Rfu630-04104 Firmware | <2.21 | |
Sick Rfu630-04104 | ||
All of | ||
Sick Rfu630-04105 Firmware | <2.21 | |
Sick Rfu630-04105 | ||
All of | ||
Sick Rfu630-04106 Firmware | <2.21 | |
Sick Rfu630-04106 | ||
All of | ||
Sick Rfu630-04109 Firmware | <2.21 | |
Sick Rfu630-04109 | ||
All of | ||
Sick Rfu630-04117 Firmware | <2.21 | |
Sick Rfu630-04117 | ||
All of | ||
Sick Rfu630-13100s01 Firmware | <2.21 | |
Sick Rfu630-13100s01 | ||
All of | ||
Sick Rfu630-13101 Firmware | <2.21 | |
Sick Rfu630-13101 | ||
All of | ||
Sick Rfu630-13102 Firmware | <2.21 | |
Sick Rfu630-13102 | ||
All of | ||
Sick Rfu630-13103 Firmware | <2.21 | |
Sick Rfu630-13103 | ||
All of | ||
Sick Rfu630-13104 Firmware | <2.21 | |
Sick Rfu630-13104 | ||
All of | ||
Sick Rfu630-13105 Firmware | <2.21 | |
Sick Rfu630-13105 | ||
All of | ||
Sick Rfu630-13106 Firmware | <2.21 | |
Sick Rfu630-13106 | ||
All of | ||
Sick Rfu630-13107 Firmware | <2.21 | |
Sick Rfu630-13107 | ||
All of | ||
Sick Rfu630-13108 Firmware | <2.21 | |
Sick Rfu630-13108 | ||
All of | ||
Sick Rfu630-13110 Firmware | <2.21 | |
Sick Rfu630-13110 | ||
All of | ||
Sick Rfu630-13111 Firmware | <2.21 | |
Sick Rfu630-13111 | ||
All of | ||
Sick Rfu630-13113 Firmware | <2.21 | |
Sick Rfu630-13113 | ||
All of | ||
Sick Rfu630-13114 Firmware | <2.21 | |
Sick Rfu630-13114 | ||
All of | ||
Sick Rfu630-13115 Firmware | <2.21 | |
Sick Rfu630-13115 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-46833 is a vulnerability related to the use of a broken or risky cryptographic algorithm in SICK RFU63x firmware version < v2.21.
CVE-2022-46833 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface.
Once the data is decrypted, the attacker may be able to access sensitive information or further exploit the system.
CVE-2022-46833 has a severity rating of 6.5 (medium).
To fix CVE-2022-46833, users should apply the patch and installation procedure provided by SICK for firmware version v2.21 or higher.