An attacker may exploit the use of weak CBC-based cipher suites in the device’s SSH service to potentially observe or manipulate parts of the encrypted SSH communication, if they are able to intercept or interact with the network traffic.
References
| Link | Resource |
|---|---|
| https://sick.com/psirt | Vendor Advisory |
| https://www.cisa.gov/resources-tools/resources/ics-recommended-practices | US Government Resource |
| https://www.first.org/cvss/calculator/3.1 | Not Applicable |
| https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0005.json | Vendor Advisory |
| https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0005.pdf | Vendor Advisory |
| https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-27 09:16
Updated : 2026-03-05 02:13
NVD link : CVE-2026-1626
Mitre link : CVE-2026-1626
CVE.ORG link : CVE-2026-1626
JSON object : View
Products Affected
sick
- lms1000_firmware
- lms1000
- mrs1000_firmware
- mrs1000
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
