Browse all 4 CVE security advisories affecting Red Lion Controls. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Red Lion Controls specializes in industrial automation and networking solutions for manufacturing and process control systems. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and insecure default configurations. The company has addressed multiple CVEs, including critical flaws that could allow unauthorized access or system compromise. While no major public security incidents have been widely documented, their exposure to common web application and network-based vulnerabilities highlights the ongoing security challenges in industrial control systems. Their products remain critical infrastructure components requiring robust security postures to mitigate potential risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-42770 | Red Lion Controls Sixnet RTU Authentication Bypass Using An Alternative Path Or Channel — ST-IPm-8460CWE-288 | 10.0 | Critical | 2023-11-21 |
| CVE-2023-40151 | Red Lion Controls Sixnet RTU Exposed Dangerous Method Or Function — ST-IPm-8460CWE-749 | 10.0 | Critical | 2023-11-21 |
| CVE-2022-3090 | Red Lion Controls Crimson 路径遍历漏洞 — Crimson 3.0CWE-22 | 7.5 | High | 2022-11-17 |
| CVE-2016-9335 | Red Lion Controls Sixnet-Managed Industrial Switches和AutomationDirect Stride-Managed Ethernet Switches 安全漏洞 — Sixnet-Managed Industrial SwitchesCWE-321 | 10.0 | - | 2018-05-09 |
This page lists every published CVE security advisory associated with Red Lion Controls. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.