TXOne Networks

CVE-2023-46385

Last Updated: March 29, 2024

CVE-2023-46385 — Loytec LINX Configurator Cleartext Transmission of Sensitive Information Vulnerability

CVE ID: CVE-2023-46385

Publication Date: 2023-11-27

Severity: High

Affected Vendor

LOYTEC electronics GmbH

Affected Product

  • LINX Configurator version 7.4.10

Vulnerability Description

When Loytec LINX Configurator connects to a device, it sends HTTP GET request to login. Since cleartext password is passed as an URL parameter, 'password' without sufficient protection, anyone could easily steal credentials if they sniff network traffics.

Vulnerable Request Format: http://<IP>:<port>/webui/config/system?username=admin&password=&login=Login

Once attackers obtain administrative credentials through network sniffing, they gain the ability to connect and control Loytec devices remotely via LINX Configurator.

Solutions & Rules

N/A

Credit

Chizuru Toyama of TXOne Networks

Questions About This Advisory?

Our PSIRT team is here to help with security-related inquiries.

psirt@txone.com