CVE-2026-1627
Plain English Summary
AI-powered analysis for quick understanding
An attacker can manipulate data being sent over the SSH connection by exploiting weak security methods in the device's firmware, but they need to be able to access the network traffic to do so. This means if they are on the same network, they could potentially alter the information exchanged between the device and other systems.
Technical Description
An attacker may exploit the use of outdated and weak MAC algorithms in the device’s SSH service to potentially compromise the integrity of the SSH session, allowing manipulation of transmitted data if the attacker can interact with the network traffic.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 27, 2026
about 1 month ago
Last Modified
Mar 5, 2026
about 1 month ago
Vendor
sick
Product
lms1000 firmware