Description
An attacker may exploit the use of weak CBC-based cipher suites in the device’s SSH service to potentially observe or manipulate parts of the encrypted SSH communication, if they are able to intercept or interact with the network traffic.
Problem types
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
Product status
Any version
Any version
References
www.sick.com/...lines_cybersecurity_by_sick_en_im0106719.pdf
www.cisa.gov/...es-tools/resources/ics-recommended-practices
www.first.org/cvss/calculator/3.1
www.sick.com/.well-known/csaf/white/2026/sca-2026-0005.json
www.sick.com/.well-known/csaf/white/2026/sca-2026-0005.pdf