Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-42770— Red Lion Controls Sixnet RTU Authentication Bypass Using An Alternative Path Or Channel

CVSS 10.0 · Critical EPSS 0.16% · P36
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-42770

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Red Lion Controls Sixnet RTU Authentication Bypass Using An Alternative Path Or Channel
Source: NVD (National Vulnerability Database)
Vulnerability Description
Red Lion SixTRAK and VersaTRAK Series RTUs with authenticated users enabled (UDR-A) any Sixnet UDR message will meet an authentication challenge over UDP/IP. When the same message is received over TCP/IP the RTU will simply accept the message with no authentication challenge.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用候选路径或通道进行的认证绕过
Source: NVD (National Vulnerability Database)
Vulnerability Title
Red Lion Controls SixTRAK和VersaTRAK 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Red Lion Controls SixTRAK和Red Lion Controls VersaTRAK都是美国红狮控制(Red Lion Controls)公司的具有开放 LINUX 软件功能的终极过程控制器。 Red Lion Controls SixTRAK和VersaTRAK Series RTUs存在安全漏洞,该漏洞源于允许攻击者绕过身份验证并执行远程代码。受影响的产品和版本:Red Lion SixTRAK,VersaTRAK RTU ST-IPm-8460 6.0.202及更高版本,ST-
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Red Lion ControlsST-IPm-8460 6.0.202 -
Red Lion ControlsST-IPm-6350 4.9.114 -
Red Lion ControlsVT-mIPm-135-D 4.9.114 -
Red Lion ControlsVT-mIPm-245-D 4.9.114 -
Red Lion ControlsVT-IPm2m-213-D 4.9.114 -
Red Lion ControlsVT-IPm2m-113-D 4.9.114 -

II. Public POCs for CVE-2023-42770

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-42770

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2023-42770

No comments yet


Leave a comment