An attacker may exploit the use of outdated and weak MAC algorithms in the device’s SSH service to potentially compromise the integrity of the SSH session, allowing manipulation of transmitted data if the attacker can interact with the network traffic.
References
| Link | Resource |
|---|---|
| https://sick.com/psirt | Vendor Advisory |
| https://www.cisa.gov/resources-tools/resources/ics-recommended-practices | US Government Resource |
| https://www.first.org/cvss/calculator/3.1 | Not Applicable |
| https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0005.json | Vendor Advisory |
| https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0005.pdf | Vendor Advisory |
| https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-27 09:16
Updated : 2026-03-05 02:11
NVD link : CVE-2026-1627
Mitre link : CVE-2026-1627
CVE.ORG link : CVE-2026-1627
JSON object : View
Products Affected
sick
- lms1000_firmware
- lms1000
- mrs1000_firmware
- mrs1000
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
