Description
An attacker may exploit the use of outdated and weak MAC algorithms in the device’s SSH service to potentially compromise the integrity of the SSH session, allowing manipulation of transmitted data if the attacker can interact with the network traffic.
Problem types
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
Product status
Any version
Any version
References
www.sick.com/...lines_cybersecurity_by_sick_en_im0106719.pdf
www.cisa.gov/...es-tools/resources/ics-recommended-practices
www.first.org/cvss/calculator/3.1
www.sick.com/.well-known/csaf/white/2026/sca-2026-0005.json
www.sick.com/.well-known/csaf/white/2026/sca-2026-0005.pdf