SB2024090506 - Multiple vulnerabilities in LOYTEC Electronics LINX Series



SB2024090506 - Multiple vulnerabilities in LOYTEC Electronics LINX Series

Published: September 5, 2024

Security Bulletin ID SB2024090506
Severity
High
Patch available
YES
Number of vulnerabilities 10
Exploitation vector Remote access
Highest impact

Breakdown by Severity

High 10% Medium 90%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 10 secuirty vulnerabilities.


1) Cleartext transmission of sensitive information (CVE-ID: CVE-2023-46380)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. A remote attacker can gain access to sensitive data.


2) Missing Authentication for Critical Function (CVE-ID: CVE-2023-46381)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to missing authentication for the preinstalled version. A remote attacker can edit any project, or create a new project and control its GUI.


3) Cleartext transmission of sensitive information (CVE-ID: CVE-2023-46382)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. A remote attacker can gain access to sensitive data.


4) Cleartext transmission of sensitive information (CVE-ID: CVE-2023-46383)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. A remote attacker can steal the password and gain full control of LOYTEC device configuration.


5) Cleartext storage of sensitive information (CVE-ID: CVE-2023-46384)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to cleartext storage of sensitive information. A remote attacker can disclose admin password and bypass the authentication to log in.


6) Cleartext transmission of sensitive information (CVE-ID: CVE-2023-46385)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information. A remote attacker can steal the password and gain full control of LOYTEC device configuration.


7) Cleartext storage of sensitive information (CVE-ID: CVE-2023-46386)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to cleartext storage of sensitive information within the registry.xml file. A remote attacker can disclose smtp client account credentials and bypass email authentication.


8) Improper access control (CVE-ID: CVE-2023-46387)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions within the dpal_config.zml file. A remote attacker can bypass implemented security restrictions and disclose sensitive information on LOYTEC device data point configuration.


9) Cleartext storage of sensitive information (CVE-ID: CVE-2023-46388)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to cleartext storage of sensitive information within the dpal_config.zml file. A remote attacker can disclose smtp client account credentials and bypass email authentication.


10) Improper access control (CVE-ID: CVE-2023-46389)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions within the registry.xml file. A remote attacker can bypass implemented security restrictions and disclose sensitive information on LINX configuration.


Remediation

Install update from vendor's website.