what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

LOYTEC Electronics Insecure Transit / Insecure Permissions / Unauthenticated Access

LOYTEC Electronics Insecure Transit / Insecure Permissions / Unauthenticated Access
Posted Nov 13, 2023
Authored by Chizuru Toyama

Products from LOYTEC electronics such as Loytec LWEB-802, L-INX Automation Servers, L-IOB I/O Controllers, and L-VIS Touch Panels suffer from improper access control and insecure transit vulnerabilities.

tags | exploit, vulnerability
advisories | CVE-2023-46380, CVE-2023-46381, CVE-2023-46382
SHA-256 | 1293dd53eba4aa74cf6c558126950c2f55c798bfedd091d0f8f110a3cbdba570

LOYTEC Electronics Insecure Transit / Insecure Permissions / Unauthenticated Access

Change Mirror Download

[+] CVE : CVE-2023-46380, CVE-2023-46381, CVE-2023-46382
[+] Title : Multiple vulnerabilities in Loytec LWEB-802, L-INX Automation Servers, L-IOB I/O Controllers, L-VIS Touch Panels
[+] Vendor : LOYTEC electronics GmbH
[+] Affected Product(s) : LINX-212 firmware 6.2.4, LVIS-3ME12-A1 firmware 6.2.2, LIOB-586 firmware 6.2.3
[+] Affected Components : LWEB-802, L-INX Automation Servers, L-IOB I/O Controllers, L-VIS Touch Panels
[+] Discovery Date : 01-Sep-2021
[+] Publication date : 03-Nov-2023
[+] Discovered by : Chizuru Toyama of TXOne networks


[Vulnerability Description]

CVE-2023-46380 : Insecure Permissions
Password change request on the web interface on LOYTEC devices is sent
in clear text over HTTP, and this allows information theft and account
takeover via network sniffing.

CVE-2023-46381 : Improper Access Control
Authentication is missing on the web user interface for the preinstalled
version of LWEB-802. If there is a project on a device, an unauthenticated
user could create a new project on a web and access/control a graphical
interface. An unauthenticated user also could edit or delete a current
web project, change settings and delete system logs etc...
http://<IP>:<port>/lweb802_pre/

CVE-2023-46382 : Insecure Permissions
The web user interface on Loytec devices requires login credentials for
critical information (Data, Commission, Config, etc...); however, username
and password information is sent in clear text over HTTP. If anyone sniff
network traffic, they could easily steal credentials.


[Timeline]

01-Sep-2021 : Vulnerabilities discovered
13-Oct-2021 : Trend Micro ZDI (Zero Day Initiative) reported to vendor (no response)
07-Oct-2022 : ICS CERT reported to vendor (no response)
03-Nov-2023 : Public disclosure

Login or Register to add favorites

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    23 Files
  • 8
    Dec 8th
    19 Files
  • 9
    Dec 9th
    1 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close