Red Lion RTUs Under Siege: Critical Flaws Demand Immediate Patching!
Two critical security flaws in Red Lion Sixnet RTU products have been uncovered, posing a risk of unauthorized code execution with root privileges. Rated a perfect 10 on the CVSS scale, these vulnerabilities could turn hackers into unwelcome guests in industrial systems. Patches and user authentication are your best defense.

Hot Take:
Looks like Red Lion’s security just got declawed! With these vulnerabilities, hackers won’t just steal your data—they’ll do it with style and root privileges. Time to patch up those holes before your automation systems become self-aware and start ordering pizza on your dime!
Key Points:
- Two critical vulnerabilities, CVE-2023-40151 and CVE-2023-42770, impact Red Lion Sixnet RTUs.
- Both flaws have a CVSS score of 10.0, indicating maximum severity.
- Vulnerabilities allow unauthenticated attackers to execute commands with root privileges.
- Exploiting these flaws could lead to significant disruption in industrial automation sectors.
- Users are advised to apply patches and enable user authentication immediately.
Cracking the Code: Vulnerabilities Unleashed
Ah, the thrill of finding a flaw so glaring, it’s like discovering a secret passageway in a high-security vault. Researchers from Claroty Team 82 have uncovered two such golden tickets in Red Lion’s Sixnet RTUs. These aren’t just any vulnerabilities—they’re the kind of vulnerabilities that hackers dream about, with a perfect 10.0 on the CVSS scale. What does that mean? Imagine a security breach so severe it makes a bank vault door look like a beaded curtain.
Port of Call: The Authentication Bypass
Let’s dive into the nitty-gritty of CVE-2023-42770, the authentication bypass flaw. This little gem arises because the Sixnet RTU software listens on the same port (1594) for both UDP and TCP. The catch? It only bothers to ask for your credentials over UDP, while TCP just rolls out the red carpet for any message, sans authentication. It’s like having a bouncer at the front door who checks IDs but a side entrance that’s wide open for anyone who can find it.
Shell Shock: The Remote Code Execution Vulnerability
Next up, we have CVE-2023-40151, the remote code execution vulnerability. This one takes advantage of the Sixnet Universal Driver’s built-in love affair with Linux shell command execution. The result? An attacker can run arbitrary code with root privileges. That’s right, folks—your RTUs could become the puppet of some digital marionette master, pulling the strings from who knows where.
Patch It Like It’s Hot: Safety Recommendations
With great vulnerabilities come great responsibilities, and Red Lion has issued a clarion call to all users: patch your systems now! The fix involves applying the latest updates and, for the love of cybersecurity, enabling user authentication. Also, maybe consider blocking access over TCP to those affected RTUs before someone decides to use them as their personal playground.
Impact Zone: The Domino Effect
The vulnerabilities impact a slew of Red Lion products that find themselves at the heart of industrial automation. We’re talking about sectors like energy, water, transportation—basically, the industries that keep the world spinning. An attacker with root access is like a bull in a china shop, capable of wreaking havoc or, at the very least, causing some serious heartburn for system administrators.
Final Thoughts: A Lion’s Share of Precaution
In conclusion, Red Lion’s RTUs might be roaring loudly, but if you don’t take swift action, it could be the hackers having the last laugh. These vulnerabilities are not just a wake-up call; they’re a full-blown fire alarm. So, to all the industrial automation wizards out there, patch your systems, enable that pesky authentication, and keep your digital kingdom secure. After all, nobody wants to be the punchline in a hacker’s joke.
