Use of a Broken or Risky Cryptographic Algorithm in SICK RFU61x firmware version <v2.25 allows a low-privileged remote attacker to decrypt the encrypted data if the user requested weak cipher suites to be used for encryption via the SSH interface. The patch and installation procedure for the firmware update is available from the responsible SICK customer contact person.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://sick.com/psirt |
![]() ![]() |
History
Tue, 22 Apr 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: SICK AG
Published: 2022-12-13T00:00:00.000Z
Updated: 2025-04-22T15:52:43.462Z
Reserved: 2022-03-21T00:00:00.000Z
Link: CVE-2022-27581

Updated: 2024-08-03T05:32:59.473Z

Status : Modified
Published: 2022-12-13T16:15:18.817
Modified: 2025-04-22T16:15:28.830
Link: CVE-2022-27581

No data.