When user authentication is not enabled the shell can execute commands with the highest privileges. Red Lion SixTRAK and VersaTRAK Series RTUs with authenticated users enabled (UDR-A) any Sixnet UDR message will meet an authentication challenge over UDP/IP. When the same message comes over TCP/IP the RTU will simply accept the message with no authentication challenge.
                
            References
                    | Link | Resource | 
|---|---|
| https://support.redlion.net/hc/en-us/articles/19339209248269-RLCSIM-2023-05-Authentication-Bypass-and-Remote-Code-Execution | Mitigation Patch Vendor Advisory | 
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-01 | Third Party Advisory US Government Resource | 
| https://support.redlion.net/hc/en-us/articles/19339209248269-RLCSIM-2023-05-Authentication-Bypass-and-Remote-Code-Execution | Mitigation Patch Vendor Advisory | 
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-01 | Third Party Advisory US Government Resource | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
Configuration 2 (hide)
| AND | 
 
 | 
Configuration 3 (hide)
| AND | 
 
 | 
Configuration 4 (hide)
| AND | 
 
 | 
Configuration 5 (hide)
| AND | 
 
 | 
Configuration 6 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 08:18
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 10.0 | 
| References | () https://support.redlion.net/hc/en-us/articles/19339209248269-RLCSIM-2023-05-Authentication-Bypass-and-Remote-Code-Execution - Mitigation, Patch, Vendor Advisory | |
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-01 - Third Party Advisory, US Government Resource | 
29 Nov 2023, 17:28
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 9.8 | 
| CWE | NVD-CWE-Other | |
| CPE | cpe:2.3:o:redlioncontrols:vt-ipm2m-113-d_firmware:4.9.114:*:*:*:*:*:*:* cpe:2.3:h:redlioncontrols:st-ipm-8460:-:*:*:*:*:*:*:* cpe:2.3:h:redlioncontrols:vt-mipm-135-d:-:*:*:*:*:*:*:* cpe:2.3:o:redlioncontrols:st-ipm-8460_firmware:6.0.202:*:*:*:*:*:*:* cpe:2.3:h:redlioncontrols:st-ipm-6350:-:*:*:*:*:*:*:* cpe:2.3:o:redlioncontrols:st-ipm-6350_firmware:4.9.114:*:*:*:*:*:*:* cpe:2.3:o:redlioncontrols:vt-ipm2m-213-d_firmware:4.9.114:*:*:*:*:*:*:* cpe:2.3:h:redlioncontrols:vt-ipm2m-113-d:-:*:*:*:*:*:*:* cpe:2.3:o:redlioncontrols:vt-mipm-135-d_firmware:4.9.114:*:*:*:*:*:*:* cpe:2.3:o:redlioncontrols:vt-mipm-245-d_firmware:4.9.114:*:*:*:*:*:*:* cpe:2.3:h:redlioncontrols:vt-ipm2m-213-d:-:*:*:*:*:*:*:* cpe:2.3:h:redlioncontrols:vt-mipm-245-d:-:*:*:*:*:*:*:* | |
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-23-320-01 - Third Party Advisory, US Government Resource | |
| References | () https://support.redlion.net/hc/en-us/articles/19339209248269-RLCSIM-2023-05-Authentication-Bypass-and-Remote-Code-Execution - Mitigation, Patch, Vendor Advisory | 
21 Nov 2023, 01:38
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-11-21 00:15
Updated : 2024-11-21 08:18
NVD link : CVE-2023-40151
Mitre link : CVE-2023-40151
CVE.ORG link : CVE-2023-40151
JSON object : View
Products Affected
                redlioncontrols
- st-ipm-8460_firmware
- vt-mipm-245-d
- vt-ipm2m-213-d_firmware
- vt-ipm2m-213-d
- st-ipm-6350
- st-ipm-6350_firmware
- vt-ipm2m-113-d
- vt-mipm-135-d_firmware
- st-ipm-8460
- vt-mipm-135-d
- vt-mipm-245-d_firmware
- vt-ipm2m-113-d_firmware
CWE
                