SCA-2026-0005
Vulnerability from csaf_sick - Published: 2026-02-27 14:00 - Updated: 2026-02-27 14:00Summary
Vulnerabilities affecting SICK LMS1000 and SICK MRS1000
Notes
summary
Two vulnerabilities affect the SICK LMS1000 and SICK MRS1000 product families. The vulnerabilities allow the use of weak cryptographic configurations in the SSH service, which may enable an attacker with network access to observe, manipulate, or compromise the integrity of SSH communications. SICK recommends applying the defined remediations for both vulnerabilities.
General Security Measures
As general security measures, SICK recommends minimizing network exposure of the devices, restricting network access and following recommended security practices in order to run the devices in a protected IT environment.
Vulnerability Classification
SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer’s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "summary",
"text": "Two vulnerabilities affect the SICK LMS1000 and SICK MRS1000 product families. The vulnerabilities allow the use of weak cryptographic configurations in the SSH service, which may enable an attacker with network access to observe, manipulate, or compromise the integrity of SSH communications. SICK recommends applying the defined remediations for both vulnerabilities.",
"title": "summary"
},
{
"category": "general",
"text": "As general security measures, SICK recommends minimizing network exposure of the devices, restricting network access and following recommended security practices in order to run the devices in a protected IT environment.",
"title": "General Security Measures"
},
{
"category": "general",
"text": "SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer\u2019s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.",
"title": "Vulnerability Classification"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@sick.de",
"issuing_authority": "SICK AG issues and issues in EHS products (when related to the Endress+Hauser SICK (EHS) joint venture).",
"name": "SICK PSIRT",
"namespace": "https://www.sick.com/psirt"
},
"references": [
{
"summary": "SICK PSIRT Security Advisories",
"url": "https://www.sick.com/psirt"
},
{
"summary": "SICK Operating Guidelines",
"url": "https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf"
},
{
"summary": "ICS-CERT recommended practices on Industrial Security",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"summary": "CVSS v3.1 Calculator",
"url": "https://www.first.org/cvss/calculator/3.1"
},
{
"category": "self",
"summary": "The canonical URL.",
"url": "https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0005.json"
}
],
"title": "Vulnerabilities affecting SICK LMS1000 and SICK MRS1000",
"tracking": {
"current_release_date": "2026-02-27T14:00:00.000Z",
"generator": {
"date": "2026-02-17T08:18:00.916Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.43"
}
},
"id": "SCA-2026-0005",
"initial_release_date": "2026-02-27T14:00:00.000Z",
"revision_history": [
{
"date": "2026-02-27T14:00:00.000Z",
"number": "1",
"summary": "Initial version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICK LMS1000 all versions",
"product_id": "CSAFPID-0001",
"product_identification_helper": {
"skus": [
"1092445"
]
}
}
}
],
"category": "product_name",
"name": "LMS1000"
}
],
"category": "product_family",
"name": "LMS1000"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SICK MRS1000 all versions",
"product_id": "CSAFPID-0002",
"product_identification_helper": {
"skus": [
"1075367",
"1081208",
"1112242",
"1131433",
"1106288",
"1104278"
]
}
}
}
],
"category": "product_name",
"name": "MRS1000"
}
],
"category": "product_family",
"name": "MRS1000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=2.4.0",
"product": {
"name": "SICK LMS1000 firmware \u003c=2.4.0",
"product_id": "CSAFPID-0003"
}
},
{
"category": "product_version_range",
"name": "2.4.1",
"product": {
"name": "SICK LMS1000 firmware 2.4.1",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "LMS1000 firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=2.4.0",
"product": {
"name": "SICK MRS1000 firmware \u003c=2.4.0",
"product_id": "CSAFPID-0005"
}
},
{
"category": "product_version_range",
"name": "2.4.1",
"product": {
"name": "SICK MRS1000 firmware 2.4.1",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "MRS1000 firmware"
}
],
"category": "vendor",
"name": "SICK AG"
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "SICK LMS1000 with firmware \u003c=2.4.0",
"product_id": "CSAFPID-0007"
},
"product_reference": "CSAFPID-0003",
"relates_to_product_reference": "CSAFPID-0001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "SICK MRS1000 with firmware \u003c=2.4.0",
"product_id": "CSAFPID-0008"
},
"product_reference": "CSAFPID-0005",
"relates_to_product_reference": "CSAFPID-0002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "SICK LMS1000 with firmware 2.4.1",
"product_id": "CSAFPID-0009"
},
"product_reference": "CSAFPID-0004",
"relates_to_product_reference": "CSAFPID-0001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "SICK MRS1000 with firmware 2.4.1",
"product_id": "CSAFPID-0010"
},
"product_reference": "CSAFPID-0006",
"relates_to_product_reference": "CSAFPID-0002"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-1626",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "An attacker may exploit the use of weak CBC-based cipher suites in the device\u2019s SSH service to potentially observe or manipulate parts of the encrypted SSH communication, if they are able to intercept or interact with the network traffic.",
"title": "Summary"
}
],
"product_status": {
"fixed": [
"CSAFPID-0009",
"CSAFPID-0010"
],
"known_affected": [
"CSAFPID-0008",
"CSAFPID-0007"
],
"recommended": [
"CSAFPID-0009",
"CSAFPID-0010"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-30T14:03:06.539Z",
"details": "Users are strongly recommended to upgrade to release version 2.4.1.",
"product_ids": [
"CSAFPID-0008",
"CSAFPID-0007"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0008",
"CSAFPID-0007"
]
}
],
"title": "CVE-2026-1626"
},
{
"cve": "CVE-2026-1627",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "An attacker may exploit the use of outdated and weak MAC algorithms in the device\u2019s SSH service to potentially compromise the integrity of the SSH session, allowing manipulation of transmitted data if the attacker can interact with the network traffic.",
"title": "Summary"
}
],
"product_status": {
"fixed": [
"CSAFPID-0009",
"CSAFPID-0010"
],
"known_affected": [
"CSAFPID-0007",
"CSAFPID-0008"
],
"recommended": [
"CSAFPID-0010",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-30T14:03:06.540Z",
"details": "Users are strongly recommended to upgrade to release version 2.4.1.\n",
"product_ids": [
"CSAFPID-0007",
"CSAFPID-0008"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0007",
"CSAFPID-0008"
]
}
],
"title": "CVE-2026-1627"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…