Helmholz: Use of a Broken or Risky Cryptographic Algorithm
The FLEXtra PROFINET-Switch devices (4-port, 8-port, and 16-port models) with firmware version 1.12.010 and earlier contain a broken or risky cryptographic algorithm (CWE-327) that allows attackers to compromise the confidentiality of configuration data and management credentials. An attacker with network access can exploit this weakness to decrypt sensitive information or gain unauthorized access to the switch's management functions, potentially enabling unauthorized modification of network settings or device configuration.
- Network access to the switch's management interface (TCP port 80 or 443)
- Ability to sniff or intercept network traffic to/from the switch
- No authentication required to exploit the weak encryption itself
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d269bcf4-c00a-49f0-889b-1e84fe8a9580Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.