When user authentication is not enabled the shell can execute commands with the highest privileges. Red Lion SixTRAK and VersaTRAK Series RTUs with authenticated users enabled (UDR-A) any Sixnet UDR message will meet an authentication challenge over UDP/IP. When the same message comes over TCP/IP the RTU will simply accept the message with no authentication challenge.
References
Link | Resource |
---|---|
https://support.redlion.net/hc/en-us/articles/19339209248269-RLCSIM-2023-05-Authentication-Bypass-and-Remote-Code-Execution | Mitigation Patch Vendor Advisory |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-01 | Third Party Advisory US Government Resource |
https://support.redlion.net/hc/en-us/articles/19339209248269-RLCSIM-2023-05-Authentication-Bypass-and-Remote-Code-Execution | Mitigation Patch Vendor Advisory |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
21 Nov 2024, 08:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.redlion.net/hc/en-us/articles/19339209248269-RLCSIM-2023-05-Authentication-Bypass-and-Remote-Code-Execution - Mitigation, Patch, Vendor Advisory | |
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-01 - Third Party Advisory, US Government Resource | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 10.0 |
29 Nov 2023, 17:28
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other | |
CPE | cpe:2.3:h:redlioncontrols:vt-mipm-245-d:-:*:*:*:*:*:*:* cpe:2.3:o:redlioncontrols:vt-mipm-135-d_firmware:4.9.114:*:*:*:*:*:*:* cpe:2.3:o:redlioncontrols:vt-ipm2m-113-d_firmware:4.9.114:*:*:*:*:*:*:* cpe:2.3:o:redlioncontrols:st-ipm-6350_firmware:4.9.114:*:*:*:*:*:*:* cpe:2.3:o:redlioncontrols:st-ipm-8460_firmware:6.0.202:*:*:*:*:*:*:* cpe:2.3:h:redlioncontrols:st-ipm-8460:-:*:*:*:*:*:*:* cpe:2.3:o:redlioncontrols:vt-ipm2m-213-d_firmware:4.9.114:*:*:*:*:*:*:* cpe:2.3:o:redlioncontrols:vt-mipm-245-d_firmware:4.9.114:*:*:*:*:*:*:* cpe:2.3:h:redlioncontrols:vt-ipm2m-213-d:-:*:*:*:*:*:*:* cpe:2.3:h:redlioncontrols:vt-ipm2m-113-d:-:*:*:*:*:*:*:* cpe:2.3:h:redlioncontrols:st-ipm-6350:-:*:*:*:*:*:*:* cpe:2.3:h:redlioncontrols:vt-mipm-135-d:-:*:*:*:*:*:*:* |
|
References | () https://support.redlion.net/hc/en-us/articles/19339209248269-RLCSIM-2023-05-Authentication-Bypass-and-Remote-Code-Execution - Mitigation, Patch, Vendor Advisory | |
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-01 - Third Party Advisory, US Government Resource | |
First Time |
Redlioncontrols vt-mipm-135-d
Redlioncontrols vt-mipm-135-d Firmware Redlioncontrols vt-mipm-245-d Redlioncontrols st-ipm-6350 Firmware Redlioncontrols vt-ipm2m-213-d Redlioncontrols vt-ipm2m-113-d Redlioncontrols Redlioncontrols vt-ipm2m-213-d Firmware Redlioncontrols st-ipm-8460 Firmware Redlioncontrols st-ipm-8460 Redlioncontrols vt-ipm2m-113-d Firmware Redlioncontrols st-ipm-6350 Redlioncontrols vt-mipm-245-d Firmware |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
21 Nov 2023, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-21 00:15
Updated : 2024-11-21 08:18
NVD link : CVE-2023-40151
Mitre link : CVE-2023-40151
CVE.ORG link : CVE-2023-40151
JSON object : View
Products Affected
redlioncontrols
- vt-mipm-245-d
- vt-mipm-135-d
- st-ipm-8460
- vt-mipm-245-d_firmware
- vt-ipm2m-213-d_firmware
- st-ipm-6350_firmware
- vt-ipm2m-113-d
- vt-mipm-135-d_firmware
- st-ipm-8460_firmware
- vt-ipm2m-213-d
- vt-ipm2m-113-d_firmware
- st-ipm-6350
CWE