{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-04100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70EF7DDD-C108-4F2F-923F-2CA69367CC6B", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-04100:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A25A71C-BD2B-451A-B616-F13E827ABBEF", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-04100s01_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7214D9B3-34C9-414E-B855-0890FDF68091", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-04100s01:-:*:*:*:*:*:*:*", "matchCriteriaId": "E02C6911-4DED-43A5-A53D-1204EC12D8FB", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-04101_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F52483C1-D518-4A88-BEBA-33520A340139", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-04101:-:*:*:*:*:*:*:*", "matchCriteriaId": "979F6063-2026-46F9-95AE-7809D8552EAE", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-04102_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8EF3A61-D58B-447C-BC1B-232D58609827", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-04102:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE25B323-CE5A-4E0F-895D-1A06CB2A759B", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-04103_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7ECE1E40-927F-48B1-9DCE-BC3BD85BAF18", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-04103:-:*:*:*:*:*:*:*", "matchCriteriaId": "D846DCF4-E711-4938-921D-F2B63095628A", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-04104_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA325DAB-C9AE-40C3-9400-2D07370B9101", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-04104:-:*:*:*:*:*:*:*", "matchCriteriaId": "305C1449-FE03-4FC2-9B56-F8EC70768B48", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-04105_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FE7AA4F-53D8-4AE9-B48D-F2B5ACDF5FCD", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-04105:-:*:*:*:*:*:*:*", "matchCriteriaId": "24B96AF0-C044-4D26-BD27-B850E9F3D555", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-04106_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "925DE8FE-DF38-4F54-A6CF-689807F3E81D", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-04106:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC8C1EE3-7029-4D75-8912-58CC33131350", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-04109_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "191684F2-2845-4D51-AA15-4C394660F960", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-04109:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F65DAC2-067A-4A9C-ACBF-71079BF39A4B", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-04117_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "64CFE84A-ECD4-41B9-89F6-6160896E8B41", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-04117:-:*:*:*:*:*:*:*", "matchCriteriaId": "D291B344-7002-4D9F-83EA-2E71B3496B04", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-13100s01_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0EA5D46D-3557-44A9-AE61-B4E343AA974E", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-13100s01:-:*:*:*:*:*:*:*", "matchCriteriaId": "297B6772-D937-4007-8FCF-0E01F3118EC4", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-13101_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58A80A51-C591-455F-93E6-BC18A38F9993", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-13101:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA44013-43DF-4848-8A03-79E20490A775", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-13102_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65784FAB-553E-45CC-BBC0-98CA91818BCC", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-13102:-:*:*:*:*:*:*:*", "matchCriteriaId": "5075AD7C-0AEE-4BEE-A41C-91E597681707", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-13103_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D75DB141-EC20-42A1-B38F-A22A0F8F1F84", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-13103:-:*:*:*:*:*:*:*", "matchCriteriaId": "83895AE6-D1D0-4C48-BDBC-643E83D10296", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-13104_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "692DC244-F6F7-40B9-82AF-5CAC009E9E56", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-13104:-:*:*:*:*:*:*:*", "matchCriteriaId": "7018A9E9-5256-479F-A117-08F5483B610E", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-13105_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CE7EA20-2E95-4738-A663-12E839E7E343", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-13105:-:*:*:*:*:*:*:*", "matchCriteriaId": "594A612A-7412-45B3-B2B8-8AC914DF5E2F", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-13106_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93C28666-AC4D-4775-815D-24BDF99F33BD", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-13106:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D9210CC-CA0B-4CE8-913F-2ACE8645FAC6", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-13107_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63F82B8B-CB6A-4FB4-A0D0-6D622FAE59AF", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-13107:-:*:*:*:*:*:*:*", "matchCriteriaId": "35C5D804-DDDA-48E3-B3DF-055BB40D617D", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-13108_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94655225-D330-4AC2-A0F9-72C92E6B07F2", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-13108:-:*:*:*:*:*:*:*", "matchCriteriaId": "32E53461-A275-4309-92B9-9D0CD7ABBC2C", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-13110_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E43A3B57-7DD2-4405-A595-D11AF9239C7E", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-13110:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8D6C816-6C82-449D-B8B9-86E124308C0A", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-13111_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D40CB92-F627-40C3-9F79-9EB2083CE215", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-13111:-:*:*:*:*:*:*:*", "matchCriteriaId": "01F3879B-AD5F-4D02-BDA8-077726F97EEF", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-13113_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A45B20C-A15D-4C2A-88A7-4F6CFE5025F4", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-13113:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7C0C79B-4A87-413B-8F85-4D77901DB7DA", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-13114_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6354CD6D-C6B9-4754-83C0-54DFFD734339", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-13114:-:*:*:*:*:*:*:*", "matchCriteriaId": "88011835-0802-494D-BC22-2C425FCBF74E", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:sick:rfu630-13115_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE2AC8E3-43B4-4E92-AA4B-52DB82D994A3", "versionEndExcluding": "2.21", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:sick:rfu630-13115:-:*:*:*:*:*:*:*", "matchCriteriaId": "4440F9FA-4C6F-4F0C-80CD-FCB09D6612C6", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Use of a Broken or Risky Cryptographic Algorithm in SICK RFU63x firmware version < v2.21 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person."}, {"lang": "es", "value": "Uso de un algoritmo criptogr\u00e1fico defectuoso o riesgoso en la versi\u00f3n de firmware SICK RFU63x < v2.21 permite a un atacante remoto con pocos privilegios descifrar los datos cifrados si el usuario solicita que se utilicen conjuntos de cifrado d\u00e9biles para el cifrado a trav\u00e9s de la interfaz SSH. El parche y el procedimiento de instalaci\u00f3n para la actualizaci\u00f3n del firmware est\u00e1n disponibles a trav\u00e9s de la persona de contacto responsable con el cliente de SICK."}], "id": "CVE-2022-46833", "lastModified": "2024-11-21T07:31:08.473", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "
[email protected]", "type": "Primary"}]}, "published": "2022-12-13T16:15:26.160", "references": [{"source": "
[email protected]", "tags": ["Vendor Advisory"], "url": "https://sick.com/psirt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://sick.com/psirt"}], "sourceIdentifier": "
[email protected]", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-327"}], "source": "
[email protected]", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-327"}], "source": "
[email protected]", "type": "Primary"}]}