CVE-2026-1626

Critical
|9.1
Exploit Available

Plain English Summary

AI-powered analysis for quick understanding

An attacker can potentially eavesdrop on or alter the encrypted communication between the lms1000 device and other systems using its SSH service, but they need to be able to intercept the network traffic first. This is possible because the device uses weak encryption methods that can be exploited.

Technical Description

An attacker may exploit the use of weak CBC-based cipher suites in the device’s SSH service to potentially observe or manipulate parts of the encrypted SSH communication, if they are able to intercept or interact with the network traffic.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References