Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1627: CWE-327 Use of a Broken or Risky Cryptographic Algorithm in SICK AG SICK LMS1000

0
Medium
VulnerabilityCVE-2026-1627cvecve-2026-1627cwe-327
Published: Fri Feb 27 2026 (02/27/2026, 08:43:30 UTC)
Source: CVE Database V5
Vendor/Project: SICK AG
Product: SICK LMS1000

Description

An attacker may exploit the use of outdated and weak MAC algorithms in the device’s SSH service to potentially compromise the integrity of the SSH session, allowing manipulation of transmitted data if the attacker can interact with the network traffic.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 20:35:51 UTC

Technical Analysis

CVE-2026-1627 is a medium-severity vulnerability affecting the SICK LMS1000 device, specifically its SSH service implementation. The root cause is the use of outdated and weak cryptographic Message Authentication Code (MAC) algorithms, which are responsible for ensuring the integrity of data transmitted over SSH sessions. Weak MAC algorithms can be susceptible to cryptographic attacks such as forgery or collision attacks, enabling an attacker who can observe or manipulate network traffic to alter the data stream without detection. This compromises the integrity of the SSH session, potentially allowing malicious modification of commands or data exchanged between the client and the device. The vulnerability requires the attacker to have network access to the device's SSH port and some level of user interaction, but no authentication is necessary, increasing the attack surface. Although confidentiality and availability are not directly impacted, the integrity compromise can have serious operational consequences, especially in industrial environments where SICK LMS1000 devices are deployed for safety and automation tasks. No patches or mitigations have been officially released by SICK AG as of the publication date. The CVSS v3.1 base score of 6.5 reflects a network attack vector with low complexity, no privileges required, user interaction needed, and an impact limited to integrity. The vulnerability is categorized under CWE-327, indicating the use of broken or risky cryptographic algorithms.

Potential Impact

The primary impact of this vulnerability is the potential compromise of data integrity within SSH sessions to the SICK LMS1000 device. For organizations relying on these devices in industrial automation, manufacturing, or safety-critical environments, manipulated SSH commands or data could lead to incorrect device behavior, process disruptions, or safety hazards. Since the vulnerability does not affect confidentiality or availability, data leakage or denial of service are less likely. However, the ability to alter transmitted data undetected can undermine trust in device communications and lead to operational errors or sabotage. The lack of authentication requirement and the network-based attack vector increase the risk of exploitation in environments where the device’s SSH service is exposed or accessible from less secure network segments. Given the specialized nature of the product, the impact is concentrated on industries using SICK LMS1000 devices, but the consequences in those sectors can be significant.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first restrict network access to the SICK LMS1000 SSH service by implementing strict firewall rules and network segmentation to limit exposure only to trusted management hosts. Disable SSH access from untrusted networks or the internet. Monitor network traffic for unusual SSH session behavior that could indicate tampering attempts. If possible, configure the device or its SSH service to use stronger, modern MAC algorithms, or disable weak MAC algorithms if configurable. Engage with SICK AG support to obtain guidance on firmware updates or patches addressing this vulnerability, and apply them promptly once available. Additionally, implement multi-factor authentication and strong user access controls for device management to reduce the risk of unauthorized access. Regularly audit device configurations and logs for signs of compromise. In environments where patching is delayed, consider using VPNs or encrypted tunnels to protect SSH traffic integrity externally.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
SICK AG
Date Reserved
2026-01-29T15:06:30.788Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a15faf32ffcdb8a2106777

Added to database: 2/27/2026, 9:11:11 AM

Last enriched: 3/6/2026, 8:35:51 PM

Last updated: 4/13/2026, 1:19:50 PM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses