Home

Description

An attacker may exploit the use of weak CBC-based cipher suites in the device’s SSH service to potentially observe or manipulate parts of the encrypted SSH communication, if they are able to intercept or interact with the network traffic.

PUBLISHED Reserved 2026-01-29 | Published 2026-02-27 | Updated 2026-02-27 | Assigner SICK AG




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Problem types

CWE-327 Use of a Broken or Risky Cryptographic Algorithm

Product status

Default status
unaffected

Any version
affected

Default status
unaffected

Any version
affected

References

sick.com/psirt

www.sick.com/...lines_cybersecurity_by_sick_en_im0106719.pdf

www.cisa.gov/...es-tools/resources/ics-recommended-practices

www.first.org/cvss/calculator/3.1

www.sick.com/.well-known/csaf/white/2026/sca-2026-0005.json

www.sick.com/.well-known/csaf/white/2026/sca-2026-0005.pdf vendor-advisory

cve.org (CVE-2026-1626)

nvd.nist.gov (CVE-2026-1626)

Download JSON