CVE-2026-1626
Plain English Summary
AI-powered analysis for quick understanding
An attacker can potentially eavesdrop on or alter the encrypted communication between the lms1000 device and other systems using its SSH service, but they need to be able to intercept the network traffic first. This is possible because the device uses weak encryption methods that can be exploited.
Technical Description
An attacker may exploit the use of weak CBC-based cipher suites in the device’s SSH service to potentially observe or manipulate parts of the encrypted SSH communication, if they are able to intercept or interact with the network traffic.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 27, 2026
about 1 month ago
Last Modified
Mar 5, 2026
about 1 month ago
Vendor
sick
Product
lms1000 firmware