Unknown
CVE-2022-46832
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2022-46832
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU62x firmware version < 2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- rfu620-10100 firmware,
- rfu620-10101 firmware,
- rfu620-10102 firmware,
- rfu620-10103 firmware,
- rfu620-10104 firmware,
- rfu620-10105 firmware,
- rfu620-10107 firmware,
- rfu620-10108 firmware,
- rfu620-10111 firmware,
- rfu620-10114 firmware,
- rfu620-10118 firmware,
- rfu620-10400 firmware,
- rfu620-10401 firmware,
- rfu620-10500 firmware,
- rfu620-10501 firmware,
- rfu620-10503 firmware,
- rfu620-10504 firmware,
- rfu620-10507 firmware,
- rfu620-10508 firmware,
- rfu620-10510 firmware,
- rfu620-10514 firmware
Weaknesses
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: