Lucene search

K
cve[email protected]CVE-2023-42770
HistoryNov 21, 2023 - 1:15 a.m.

CVE-2023-42770

2023-11-2101:15:07
CWE-306
CWE-288
web.nvd.nist.gov
15
red lion
versatrak
rtus
udr-a
authentication bypass
tcp/ip
cve-2023-42770

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.3%

Red Lion SixTRAK and VersaTRAK Series RTUs with authenticated users enabled (UDR-A) any Sixnet UDR message will meet an authentication challenge over UDP/IP. When the same message is received over TCP/IP the RTU will simply accept the message with no authentication challenge.

Affected configurations

NVD
Node
redlioncontrolsst-ipm-6350_firmwareMatch4.9.114
AND
redlioncontrolsst-ipm-6350Match-
Node
redlioncontrolsst-ipm-8460_firmwareMatch6.0.202
AND
redlioncontrolsst-ipm-8460Match-
Node
redlioncontrolsvt-mipm-135-d_firmwareMatch4.9.114
AND
redlioncontrolsvt-mipm-135-dMatch-
Node
redlioncontrolsvt-mipm-245-d_firmwareMatch4.9.114
AND
redlioncontrolsvt-mipm-245-dMatch-
Node
redlioncontrolsvt-ipm2m-213-d_firmwareMatch4.9.114
AND
redlioncontrolsvt-ipm2m-213-dMatch-
Node
redlioncontrolsvt-ipm2m-113-d_firmwareMatch4.9.114
AND
redlioncontrolsvt-ipm2m-113-dMatch-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "ST-IPm-8460",
    "vendor": "Red Lion Controls",
    "versions": [
      {
        "status": "affected",
        "version": "6.0.202"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "ST-IPm-6350",
    "vendor": "Red Lion Controls",
    "versions": [
      {
        "status": "affected",
        "version": "4.9.114"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "VT-mIPm-135-D",
    "vendor": "Red Lion Controls",
    "versions": [
      {
        "status": "affected",
        "version": "4.9.114"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "VT-mIPm-245-D",
    "vendor": "Red Lion Controls",
    "versions": [
      {
        "status": "affected",
        "version": "4.9.114"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "VT-IPm2m-213-D",
    "vendor": "Red Lion Controls",
    "versions": [
      {
        "status": "affected",
        "version": "4.9.114"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "VT-IPm2m-113-D",
    "vendor": "Red Lion Controls",
    "versions": [
      {
        "status": "affected",
        "version": "4.9.114"
      }
    ]
  }
]

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.3%

Related for CVE-2023-42770