{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2023-40151", "ASSIGNER": "ics-cert@hq.dhs.gov", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "\n\n\nWhen user authentication is not enabled the shell can execute commands with the highest privileges. Red Lion SixTRAK and VersaTRAK Series RTUs with authenticated users enabled (UDR-A) any Sixnet UDR message will meet an authentication challenge over UDP/IP. When the same message comes over TCP/IP the RTU will simply accept the message with no authentication challenge.\n\n\n\n" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-749 Exposed Dangerous Method Or Function", "cweId": "CWE-749" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Red Lion Controls", "product": { "product_data": [ { "product_name": "ST-IPm-8460", "version": { "version_data": [ { "version_affected": "=", "version_value": "6.0.202" } ] } }, { "product_name": "ST-IPm-6350", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.9.114" } ] } }, { "product_name": "VT-mIPm-135-D", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.9.114" } ] } }, { "product_name": "VT-mIPm-245-D", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.9.114" } ] } }, { "product_name": "VT-IPm2m-213-D", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.9.114" } ] } }, { "product_name": "VT-IPm2m-113-D", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.9.114" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-01", "refsource": "MISC", "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-01" }, { "url": "https://support.redlion.net/hc/en-us/articles/19339209248269-RLCSIM-2023-05-Authentication-Bypass-and-Remote-Code-Execution", "refsource": "MISC", "name": "https://support.redlion.net/hc/en-us/articles/19339209248269-RLCSIM-2023-05-Authentication-Bypass-and-Remote-Code-Execution" } ] }, "generator": { "engine": "Vulnogram 0.1.0-dev" }, "source": { "advisory": "ICSA-23-320-01", "discovery": "EXTERNAL" }, "solution": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n
Red Lion recommends users apply the latest patches to their products.
Red Lion recommends users apply additional mitigations to help reduce the risk:
Blocking all or most Sixnet UDR messages over TCP/IP will eliminate authentication bypass. Sixnet UDR messages over TCP/IP will be ignored.
To block all Sixnet UDR messages over TCP/IP install Patch1_tcp_udr_all_blocked.tar.gz.
To block all Sixnet UDR messages except I/O commands over TCP/IP and UDP/IP install Patch2_io_open.tar.gz.
To Block all Sixnet UDR messages over TCP/IP:
Remove these rules from the default rc.firewall file:
Add one DROP rule which will drop all TCP/IP packet coming on UDR port 1594 by typing the following commands:
For installation instructions see Red Lion's support page.
For more information, please refer to Red Lion\u2019s security bulletin.
\n\n