418 lines
11 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-27581",
"sourceIdentifier": "psirt@sick.de",
"published": "2022-12-13T16:15:18.817",
"lastModified": "2024-11-21T06:55:59.280",
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "Use of a Broken or Risky Cryptographic Algorithm in SICK RFU61x firmware version <v2.25 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person."
},
{
"lang": "es",
"value": "El uso de un algoritmo criptogr\u00e1fico roto o riesgoso en la versi\u00f3n de firmware SICK RFU61x "
2023-04-24 12:24:31 +02:00
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
2023-04-24 12:24:31 +02:00
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@sick.de",
"type": "Secondary",
2023-04-24 12:24:31 +02:00
"description": [
{
"lang": "en",
"value": "CWE-327"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
2023-04-24 12:24:31 +02:00
"description": [
{
"lang": "en",
"value": "CWE-327"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sick:rfu610-10600_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.25",
"matchCriteriaId": "EC000466-9D77-43B0-BADC-5E6B0E2B1957"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sick:rfu610-10600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E35D3B33-EE83-4334-B2EF-15749D66E932"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sick:rfu610-10601_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.25",
"matchCriteriaId": "76748AF8-788C-416F-B2BC-9A84BA5C7AC4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sick:rfu610-10601:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D69C972-67F7-4030-B8FE-08C336421BC4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sick:rfu610-10603_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.25",
"matchCriteriaId": "71F7B120-1C4E-4677-A930-9AEFE544606B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sick:rfu610-10603:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64C9CF2D-FF9D-47E6-90DB-00BB61925F4B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sick:rfu610-10604_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.25",
"matchCriteriaId": "3F3F8351-68D5-4E6B-A32E-E2718706B2B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sick:rfu610-10604:-:*:*:*:*:*:*:*",
"matchCriteriaId": "076B6B41-400D-47B9-88B7-9DC7D3736652"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sick:rfu610-10605_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.25",
"matchCriteriaId": "E2E067E7-5183-4520-942C-98440C6F1573"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sick:rfu610-10605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B582823-335F-4E4A-84D9-D2CD0B01CE84"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sick:rfu610-10607_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.25",
"matchCriteriaId": "388AA4E0-E70C-4C72-9D20-8A5F439F1984"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sick:rfu610-10607:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C46BEBC-23B0-465C-AC28-07853DD719B8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sick:rfu610-10609_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.25",
"matchCriteriaId": "18958BFA-55C3-4139-A192-8D78CBB2DCA3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sick:rfu610-10609:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E06FA3D-239B-45BF-A1E5-E3A78D66E31F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sick:rfu610-10610_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.25",
"matchCriteriaId": "1BC10C5B-67D3-4A50-A4E0-AD74170DB16B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sick:rfu610-10610:-:*:*:*:*:*:*:*",
"matchCriteriaId": "569EAD89-2220-434E-8F66-9B860563763A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sick:rfu610-10613_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.25",
"matchCriteriaId": "51BB7B20-565B-43DE-9D20-62025C95C701"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sick:rfu610-10613:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32247792-4A6D-4401-8CC5-2AAF398772FE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sick:rfu610-10614_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.25",
"matchCriteriaId": "D7B7CBA2-BE18-4637-B719-F9B3DA467C08"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sick:rfu610-10614:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88BF06A2-B622-4477-8BE6-58AE286C1B93"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sick:rfu610-10618_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.25",
"matchCriteriaId": "5F4024C5-DA88-416E-9661-9A5DFF671794"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sick:rfu610-10618:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C24AF73-53E7-401C-BFA4-20B902787F95"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sick:rfu610-10700_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.25",
"matchCriteriaId": "B082D143-61D7-40B7-AD8A-63C9C0B058A8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sick:rfu610-10700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FBBCDC86-7CC0-41C1-A34C-A04A6B11E94C"
}
]
}
]
}
],
"references": [
{
"url": "https://sick.com/psirt",
"source": "psirt@sick.de",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://sick.com/psirt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}