Unrated severityNVD Advisory· Published Feb 27, 2026· Updated Mar 6, 2026
CVE-2026-1627
CVE-2026-1627
Description
An attacker may exploit the use of outdated and weak MAC algorithms in the device’s SSH service to potentially compromise the integrity of the SSH session, allowing manipulation of transmitted data if the attacker can interact with the network traffic.
Affected products
2- SICK AG/SICK LMS1000v5Range: 0
- SICK AG/SICK MRS1000v5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- www.sick.com/.well-known/csaf/white/2026/sca-2026-0005.pdfmitrevendor-advisory
- sick.com/psirtmitrex_SICK PSIRT Security Advisories
- www.cisa.gov/resources-tools/resources/ics-recommended-practicesmitrex_ICS-CERT recommended practices on Industrial Security
- www.first.org/cvss/calculator/3.1mitrex_CVSS v3.1 Calculator
- www.sick.com/.well-known/csaf/white/2026/sca-2026-0005.jsonmitrex_The canonical URL.
- www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdfmitrex_SICK Operating Guidelines
News mentions
0No linked articles in our index yet.