Multiple vulnerabilities in LOYTEC Electronics LINX Series



Published: 2024-09-05
Risk High
Patch available YES
Number of vulnerabilities 10
CVE-ID CVE-2023-46380
CVE-2023-46381
CVE-2023-46382
CVE-2023-46383
CVE-2023-46384
CVE-2023-46385
CVE-2023-46386
CVE-2023-46387
CVE-2023-46388
CVE-2023-46389
CWE-ID CWE-319
CWE-306
CWE-312
CWE-284
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
LINX-212
Hardware solutions / Other hardware appliances

LVIS-3ME12-A1
Hardware solutions / Other hardware appliances

LIOB-586
Hardware solutions / Other hardware appliances

L-INX Configurator
Hardware solutions / Other hardware appliances

LINX-151
Hardware solutions / Other hardware appliances

Vendor LOYTEC

Security Bulletin

This security bulletin contains information about 10 vulnerabilities.

1) Cleartext transmission of sensitive information

EUVDB-ID: #VU96791

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-46380

CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. A remote attacker can gain access to sensitive data.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

LINX-212: 6.2.4

LVIS-3ME12-A1: 6.2.2

LIOB-586: 6.2.3

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Missing Authentication for Critical Function

EUVDB-ID: #VU96792

Risk: High

CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-46381

CWE-ID: CWE-306 - Missing Authentication for Critical Function

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to missing authentication for the preinstalled version. A remote attacker can edit any project, or create a new project and control its GUI.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

LINX-212: 6.2.4

LVIS-3ME12-A1: 6.2.2

LIOB-586: 6.2.3

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Cleartext transmission of sensitive information

EUVDB-ID: #VU96793

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-46382

CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. A remote attacker can gain access to sensitive data.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

LINX-212: 6.2.4

LVIS-3ME12-A1: 6.2.2

LIOB-586: 6.2.3

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Cleartext transmission of sensitive information

EUVDB-ID: #VU96794

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-46383

CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. A remote attacker can steal the password and gain full control of LOYTEC device configuration.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

L-INX Configurator: 7.4.10

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Cleartext storage of sensitive information

EUVDB-ID: #VU96796

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-46384

CWE-ID: CWE-312 - Cleartext Storage of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to cleartext storage of sensitive information. A remote attacker can disclose admin password and bypass the authentication to log in.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

L-INX Configurator: 7.4.10

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Cleartext transmission of sensitive information

EUVDB-ID: #VU96798

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-46385

CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. A remote attacker can steal the password and gain full control of LOYTEC device configuration.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

L-INX Configurator: 7.4.10

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Cleartext storage of sensitive information

EUVDB-ID: #VU96818

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-46386

CWE-ID: CWE-312 - Cleartext Storage of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to cleartext storage of sensitive information within the registry.xml file. A remote attacker can disclose smtp client account credentials and bypass email authentication.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

LINX-212: 6.2.4

LINX-151: 7.2.4

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Improper access control

EUVDB-ID: #VU96819

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-46387

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions within the dpal_config.zml file. A remote attacker can bypass implemented security restrictions and disclose sensitive information on LOYTEC device data point configuration.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

LINX-212: 6.2.4

LINX-151: 7.2.4

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Cleartext storage of sensitive information

EUVDB-ID: #VU96820

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-46388

CWE-ID: CWE-312 - Cleartext Storage of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to cleartext storage of sensitive information within the dpal_config.zml file. A remote attacker can disclose smtp client account credentials and bypass email authentication.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

LINX-212: 6.2.4

LINX-151: 7.2.4

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Improper access control

EUVDB-ID: #VU96821

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-46389

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions within the registry.xml file. A remote attacker can bypass implemented security restrictions and disclose sensitive information on LINX configuration.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

LINX-212: 6.2.4

LINX-151: 7.2.4

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###