cve-2021-32496
Vulnerability from cvelistv5
Published
2021-06-28 11:02
Modified
2024-08-03 23:17
Severity ?
EPSS score ?
0.07%
(0.19106)
Summary
SICK Visionary-S CX up version 5.21.2.29154R are vulnerable to an Inadequate Encryption Strength vulnerability concerning the internal SSH interface solely used by SICK for recovering returned devices. The use of weak ciphers make it easier for an attacker to break the security that protects information transmitted from the client to the SSH server, assuming the attacker has access to the network on which the device is connected. This can increase the risk that encryption will be compromised, leading to the exposure of sensitive user information and man-in-the-middle attacks.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | SICK Visionary-S CX |
Version: <5.21.2.29154R |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T23:17:29.551Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.sick.com/de/en/service-and-support/the-sick-product-security-incident-response-team-sick-psirt/w/psirt/#advisories", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "SICK Visionary-S CX", vendor: "n/a", versions: [ { status: "affected", version: "<5.21.2.29154R", }, ], }, ], descriptions: [ { lang: "en", value: "SICK Visionary-S CX up version 5.21.2.29154R are vulnerable to an Inadequate Encryption Strength vulnerability concerning the internal SSH interface solely used by SICK for recovering returned devices. The use of weak ciphers make it easier for an attacker to break the security that protects information transmitted from the client to the SSH server, assuming the attacker has access to the network on which the device is connected. This can increase the risk that encryption will be compromised, leading to the exposure of sensitive user information and man-in-the-middle attacks.", }, ], problemTypes: [ { descriptions: [ { description: "Inadequate SSH configuration in Visionary-S CX", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-28T11:02:32", orgId: "a6863dd2-93fc-443d-bef1-79f0b5020988", shortName: "SICK AG", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.sick.com/de/en/service-and-support/the-sick-product-security-incident-response-team-sick-psirt/w/psirt/#advisories", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@sick.de", ID: "CVE-2021-32496", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "SICK Visionary-S CX", version: { version_data: [ { version_value: "<5.21.2.29154R", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "SICK Visionary-S CX up version 5.21.2.29154R are vulnerable to an Inadequate Encryption Strength vulnerability concerning the internal SSH interface solely used by SICK for recovering returned devices. The use of weak ciphers make it easier for an attacker to break the security that protects information transmitted from the client to the SSH server, assuming the attacker has access to the network on which the device is connected. This can increase the risk that encryption will be compromised, leading to the exposure of sensitive user information and man-in-the-middle attacks.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Inadequate SSH configuration in Visionary-S CX", }, ], }, ], }, references: { reference_data: [ { name: "https://www.sick.com/de/en/service-and-support/the-sick-product-security-incident-response-team-sick-psirt/w/psirt/#advisories", refsource: "MISC", url: "https://www.sick.com/de/en/service-and-support/the-sick-product-security-incident-response-team-sick-psirt/w/psirt/#advisories", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "a6863dd2-93fc-443d-bef1-79f0b5020988", assignerShortName: "SICK AG", cveId: "CVE-2021-32496", datePublished: "2021-06-28T11:02:32", dateReserved: "2021-05-10T00:00:00", dateUpdated: "2024-08-03T23:17:29.551Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2021-32496\",\"sourceIdentifier\":\"psirt@sick.de\",\"published\":\"2021-06-28T12:15:14.703\",\"lastModified\":\"2024-11-21T06:07:09.053\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"SICK Visionary-S CX up version 5.21.2.29154R are vulnerable to an Inadequate Encryption Strength vulnerability concerning the internal SSH interface solely used by SICK for recovering returned devices. The use of weak ciphers make it easier for an attacker to break the security that protects information transmitted from the client to the SSH server, assuming the attacker has access to the network on which the device is connected. This can increase the risk that encryption will be compromised, leading to the exposure of sensitive user information and man-in-the-middle attacks.\"},{\"lang\":\"es\",\"value\":\"SICK Visionary-S CX hasta la versión 5.21.2.29154R, son susceptibles a una vulnerabilidad de Fuerza de Encriptación Inadecuada relativa a la interfaz interna SSH utilizada únicamente por SICK para la recuperación de dispositivos devueltos. El uso de cifrados débiles facilita a un atacante rompa la seguridad que protege la información transmitida desde el cliente al servidor SSH, asumiendo que el atacante tenga acceso a la red en la que está conectado el dispositivo. Esto puede aumentar el riesgo de que la encriptación se vea comprometida, conllevando a la exposición de información confidencial del usuario y ataques de tipo man-in-the-middle\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:P/I:N/A:N\",\"baseScore\":3.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-326\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sick:visionary-s_cx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.21.2.29154r\",\"matchCriteriaId\":\"88B84A38-24C1-4AC0-8075-59891D947F8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:sick:visionary-s_cx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E46BE6B-3294-4E3A-92D8-18431F82E83D\"}]}]}],\"references\":[{\"url\":\"https://www.sick.com/de/en/service-and-support/the-sick-product-security-incident-response-team-sick-psirt/w/psirt/#advisories\",\"source\":\"psirt@sick.de\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.sick.com/de/en/service-and-support/the-sick-product-security-incident-response-team-sick-psirt/w/psirt/#advisories\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.