fkie_cve-2022-46833
Vulnerability from fkie_nvd
Published
2022-12-13 16:15
Modified
2025-04-22 15:16
Summary
Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-04100_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "70EF7DDD-C108-4F2F-923F-2CA69367CC6B",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-04100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A25A71C-BD2B-451A-B616-F13E827ABBEF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-04100s01_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7214D9B3-34C9-414E-B855-0890FDF68091",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-04100s01:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E02C6911-4DED-43A5-A53D-1204EC12D8FB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-04101_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F52483C1-D518-4A88-BEBA-33520A340139",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-04101:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "979F6063-2026-46F9-95AE-7809D8552EAE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-04102_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8EF3A61-D58B-447C-BC1B-232D58609827",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-04102:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE25B323-CE5A-4E0F-895D-1A06CB2A759B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-04103_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7ECE1E40-927F-48B1-9DCE-BC3BD85BAF18",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-04103:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D846DCF4-E711-4938-921D-F2B63095628A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-04104_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA325DAB-C9AE-40C3-9400-2D07370B9101",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-04104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "305C1449-FE03-4FC2-9B56-F8EC70768B48",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-04105_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FE7AA4F-53D8-4AE9-B48D-F2B5ACDF5FCD",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-04105:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "24B96AF0-C044-4D26-BD27-B850E9F3D555",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-04106_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "925DE8FE-DF38-4F54-A6CF-689807F3E81D",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-04106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC8C1EE3-7029-4D75-8912-58CC33131350",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-04109_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "191684F2-2845-4D51-AA15-4C394660F960",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-04109:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F65DAC2-067A-4A9C-ACBF-71079BF39A4B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-04117_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "64CFE84A-ECD4-41B9-89F6-6160896E8B41",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-04117:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D291B344-7002-4D9F-83EA-2E71B3496B04",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-13100s01_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EA5D46D-3557-44A9-AE61-B4E343AA974E",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-13100s01:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "297B6772-D937-4007-8FCF-0E01F3118EC4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-13101_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "58A80A51-C591-455F-93E6-BC18A38F9993",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-13101:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CA44013-43DF-4848-8A03-79E20490A775",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-13102_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "65784FAB-553E-45CC-BBC0-98CA91818BCC",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-13102:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5075AD7C-0AEE-4BEE-A41C-91E597681707",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-13103_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D75DB141-EC20-42A1-B38F-A22A0F8F1F84",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-13103:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "83895AE6-D1D0-4C48-BDBC-643E83D10296",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-13104_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "692DC244-F6F7-40B9-82AF-5CAC009E9E56",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-13104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7018A9E9-5256-479F-A117-08F5483B610E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-13105_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CE7EA20-2E95-4738-A663-12E839E7E343",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-13105:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "594A612A-7412-45B3-B2B8-8AC914DF5E2F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-13106_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "93C28666-AC4D-4775-815D-24BDF99F33BD",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-13106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D9210CC-CA0B-4CE8-913F-2ACE8645FAC6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-13107_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "63F82B8B-CB6A-4FB4-A0D0-6D622FAE59AF",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-13107:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "35C5D804-DDDA-48E3-B3DF-055BB40D617D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-13108_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "94655225-D330-4AC2-A0F9-72C92E6B07F2",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-13108:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "32E53461-A275-4309-92B9-9D0CD7ABBC2C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-13110_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E43A3B57-7DD2-4405-A595-D11AF9239C7E",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-13110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8D6C816-6C82-449D-B8B9-86E124308C0A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-13111_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D40CB92-F627-40C3-9F79-9EB2083CE215",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-13111:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "01F3879B-AD5F-4D02-BDA8-077726F97EEF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-13113_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A45B20C-A15D-4C2A-88A7-4F6CFE5025F4",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-13113:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7C0C79B-4A87-413B-8F85-4D77901DB7DA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-13114_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6354CD6D-C6B9-4754-83C0-54DFFD734339",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-13114:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88011835-0802-494D-BC22-2C425FCBF74E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:sick:rfu630-13115_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE2AC8E3-43B4-4E92-AA4B-52DB82D994A3",
                     versionEndExcluding: "2.21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:sick:rfu630-13115:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4440F9FA-4C6F-4F0C-80CD-FCB09D6612C6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.",
      },
      {
         lang: "es",
         value: "Uso de un algoritmo criptográfico defectuoso o riesgoso en la versión de firmware SICK RFU63x &lt; v2.21 permite a un atacante remoto con pocos privilegios descifrar los datos cifrados si el usuario solicita que se utilicen conjuntos de cifrado débiles para el cifrado a través de la interfaz SSH. El parche y el procedimiento de instalación para la actualización del firmware están disponibles a través de la persona de contacto responsable con el cliente de SICK.",
      },
   ],
   id: "CVE-2022-46833",
   lastModified: "2025-04-22T15:16:07.727",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2022-12-13T16:15:26.160",
   references: [
      {
         source: "psirt@sick.de",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://sick.com/psirt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://sick.com/psirt",
      },
   ],
   sourceIdentifier: "psirt@sick.de",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-327",
            },
         ],
         source: "psirt@sick.de",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-327",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.