Show filters
22 Total Results
Displaying 1-10 of 22
Sort by:
Attacker Value
Unknown
CVE-2023-42770
Disclosure Date: November 21, 2023 (last updated November 30, 2023)
Red Lion SixTRAK and VersaTRAK Series RTUs with authenticated users enabled (UDR-A) any Sixnet UDR message will meet an authentication challenge over UDP/IP. When the same message is received over TCP/IP the RTU will simply accept the message with no authentication challenge.
0
Attacker Value
Unknown
CVE-2023-40151
Disclosure Date: November 21, 2023 (last updated November 30, 2023)
When user authentication is not enabled the shell can execute commands with the highest privileges. Red Lion SixTRAK and VersaTRAK Series RTUs with authenticated users enabled (UDR-A) any Sixnet UDR message will meet an authentication challenge over UDP/IP. When the same message comes over TCP/IP the RTU will simply accept the message with no authentication challenge.
0
Attacker Value
Unknown
CVE-2023-5719
Disclosure Date: November 06, 2023 (last updated November 15, 2023)
The Crimson 3.2 Windows-based configuration tool allows users with administrative access to define new passwords for users and to download the resulting security configuration to a device. If such a password contains the percent (%) character, invalid values will be included, potentially truncating the string if a NUL is encountered. If the simplified password is not detected by the administrator, the device might be left in a vulnerable state as a result of more-easily compromised credentials. Note that passwords entered via the Crimson system web server do not suffer from this vulnerability.
0
Attacker Value
Unknown
CVE-2023-34412
Disclosure Date: August 17, 2023 (last updated February 29, 2024)
A vulnerability in Red Lion Europe mbNET/mbNET.rokey and Helmholz REX 200 and REX 250 devices with firmware lower 7.3.2 allows an
authenticated remote attacker with high privileges to inject malicious HTML or JavaScript code (XSS).
0
Attacker Value
Unknown
CVE-2022-3090
Disclosure Date: November 17, 2022 (last updated December 22, 2024)
Red Lion Controls Crimson 3.0 versions 707.000 and prior, Crimson 3.1 versions 3126.001 and prior, and Crimson 3.2 versions 3.2.0044.0 and prior are vulnerable to path traversal. When attempting to open a file using a specific path, the user's password hash is sent to an arbitrary host. This could allow an attacker to obtain user credential hashes.
0
Attacker Value
Unknown
CVE-2022-1039
Disclosure Date: April 14, 2022 (last updated October 07, 2023)
The weak password on the web user interface can be exploited via HTTP or HTTPS. Once such access has been obtained, the other passwords can be changed. The weak password on Linux accounts can be accessed via SSH or Telnet, the former of which is by default enabled on trusted interfaces. While the SSH service does not support root login, a user logging in using either of the other Linux accounts may elevate to root access using the su command if they have access to the associated password.
0
Attacker Value
Unknown
CVE-2022-26516
Disclosure Date: April 14, 2022 (last updated October 07, 2023)
Authorized users may install a maliciously modified package file when updating the device via the web user interface. The user may inadvertently use a package file obtained from an unauthorized source or a file that was compromised between download and deployment.
0
Attacker Value
Unknown
CVE-2022-27179
Disclosure Date: April 14, 2022 (last updated October 07, 2023)
A malicious actor having access to the exported configuration file may obtain the stored credentials and thereby gain access to the protected resource. If the same passwords were used for other resources, further such assets may be compromised.
0
Attacker Value
Unknown
CVE-2020-27279
Disclosure Date: January 06, 2021 (last updated November 28, 2024)
A NULL pointer deference vulnerability has been identified in the protocol converter. An attacker could send a specially crafted packet that could reboot the device running Crimson 3.1 (Build versions prior to 3119.001).
0
Attacker Value
Unknown
CVE-2020-27283
Disclosure Date: January 06, 2021 (last updated November 28, 2024)
An attacker could send a specially crafted message to Crimson 3.1 (Build versions prior to 3119.001) that could leak arbitrary memory locations.
0