mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 13:36:56 +00:00
411 lines
11 KiB
JSON
411 lines
11 KiB
JSON
{
|
|
"id": "CVE-2022-27581",
|
|
"sourceIdentifier": "psirt@sick.de",
|
|
"published": "2022-12-13T16:15:18.817",
|
|
"lastModified": "2022-12-15T17:44:46.970",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Use of a Broken or Risky Cryptographic Algorithm in SICK RFU61x firmware version <v2.25 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El uso de un algoritmo criptogr\u00e1fico roto o riesgoso en la versi\u00f3n de firmware SICK RFU61x "
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-327"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "psirt@sick.de",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-327"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sick:rfu610-10600_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.25",
|
|
"matchCriteriaId": "EC000466-9D77-43B0-BADC-5E6B0E2B1957"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:sick:rfu610-10600:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E35D3B33-EE83-4334-B2EF-15749D66E932"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sick:rfu610-10601_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.25",
|
|
"matchCriteriaId": "76748AF8-788C-416F-B2BC-9A84BA5C7AC4"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:sick:rfu610-10601:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8D69C972-67F7-4030-B8FE-08C336421BC4"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sick:rfu610-10603_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.25",
|
|
"matchCriteriaId": "71F7B120-1C4E-4677-A930-9AEFE544606B"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:sick:rfu610-10603:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "64C9CF2D-FF9D-47E6-90DB-00BB61925F4B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sick:rfu610-10604_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.25",
|
|
"matchCriteriaId": "3F3F8351-68D5-4E6B-A32E-E2718706B2B1"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:sick:rfu610-10604:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "076B6B41-400D-47B9-88B7-9DC7D3736652"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sick:rfu610-10605_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.25",
|
|
"matchCriteriaId": "E2E067E7-5183-4520-942C-98440C6F1573"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:sick:rfu610-10605:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B582823-335F-4E4A-84D9-D2CD0B01CE84"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sick:rfu610-10607_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.25",
|
|
"matchCriteriaId": "388AA4E0-E70C-4C72-9D20-8A5F439F1984"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:sick:rfu610-10607:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6C46BEBC-23B0-465C-AC28-07853DD719B8"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sick:rfu610-10609_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.25",
|
|
"matchCriteriaId": "18958BFA-55C3-4139-A192-8D78CBB2DCA3"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:sick:rfu610-10609:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0E06FA3D-239B-45BF-A1E5-E3A78D66E31F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sick:rfu610-10610_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.25",
|
|
"matchCriteriaId": "1BC10C5B-67D3-4A50-A4E0-AD74170DB16B"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:sick:rfu610-10610:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "569EAD89-2220-434E-8F66-9B860563763A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sick:rfu610-10613_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.25",
|
|
"matchCriteriaId": "51BB7B20-565B-43DE-9D20-62025C95C701"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:sick:rfu610-10613:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "32247792-4A6D-4401-8CC5-2AAF398772FE"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sick:rfu610-10614_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.25",
|
|
"matchCriteriaId": "D7B7CBA2-BE18-4637-B719-F9B3DA467C08"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:sick:rfu610-10614:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "88BF06A2-B622-4477-8BE6-58AE286C1B93"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sick:rfu610-10618_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.25",
|
|
"matchCriteriaId": "5F4024C5-DA88-416E-9661-9A5DFF671794"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:sick:rfu610-10618:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5C24AF73-53E7-401C-BFA4-20B902787F95"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sick:rfu610-10700_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.25",
|
|
"matchCriteriaId": "B082D143-61D7-40B7-AD8A-63C9C0B058A8"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:sick:rfu610-10700:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FBBCDC86-7CC0-41C1-A34C-A04A6B11E94C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://sick.com/psirt",
|
|
"source": "psirt@sick.de",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |