Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

VSCO expands AI editing capabilities and supports RAW files

How attackers can bypass synced passkeys

Can we hear the “beat” of gravitational waves in a pulsar?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Two CVSS 10.0 bugs in Red Lion RTU could allow hackers to gain complete industrial control
Identity

Two CVSS 10.0 bugs in Red Lion RTU could allow hackers to gain complete industrial control

userBy userOctober 15, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 15, 2025Ravi LakshmananVulnerabilities/Critical Infrastructure

Hack complete industrial control

Cybersecurity researchers have uncovered two critical security flaws affecting the Red Lion Sixnet remote terminal unit (RTU) product. Successful exploitation could lead to code execution with highest privileges.

This flaw is tracked as CVE-2023-40151 and CVE-2023-42770, both rated 10.0 in the CVSS scoring system.

“This vulnerability affects Red Lion SixTRAK and VersaTRAK RTU and allows an unauthenticated attacker to execute commands with root privileges,” Claroty Team 82 researchers said in a report released Tuesday.

Red Lion’s Sixnet RTU provides advanced automation, control, and data collection capabilities in industrial automation and control systems primarily across the energy, water, wastewater treatment, transportation, utilities, and manufacturing sectors.

These industrial devices are configured using a Windows utility called the Sixnet IO Tool Kit, which uses the proprietary Sixnet “universal” protocol used to enable interfacing and communication between the kit and the RTU.

DFIR retainer service

On top of this mechanism, there is also a user authorization system to support file management, setting/retrieving station information, retrieving Linux kernel and boot versions, etc. via the UDP protocol.

The two vulnerabilities identified by Claroty are listed below.

CVE-2023-42770 – Authentication bypass resulting from Sixnet RTU software listening on the same port (number 1594) for UDP and TCP. Requires only an authentication challenge over UDP and accepts incoming messages over TCP without prompting for authentication. CVE-2023-40151 – Remote code execution vulnerability (UDR) exploiting the Sixnet Universal Driver Built-in support for Linux shell command execution to execute arbitrary code with root privileges

As a result, an attacker could chain both flaws together to bypass authentication protections and execute commands to remotely execute code.

“On Red Lion SixTRAK and VersaTRAK series RTUs with authenticated user (UDR-A) enabled, any Sixnet UDR message received over TCP/IP, the RTU accepts the message without an authentication challenge. If user authentication is not enabled, the shell can execute commands with highest privileges,” Red Lion said in an advisory released in June 2025.

Users are encouraged to patch the two vulnerabilities as soon as possible. It is also recommended that you enable user authentication on the Red Lion RTU and block access to the affected RTU over TCP.

CIS build kit

According to an alert issued by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) in November 2023, this flaw affects the following products:

ST-IPm-8460: Firmware version 6.0.202 or later ST-IPm-6350: Firmware version 4.9.114 or later VT-mIPm-135-D: Firmware version 4.9.114 or later VT-mIPm-245-D: Firmware version 4.9.114 or later VT-IPm2m-213-D: Firmware version 4.9.114 or later VT-IPm2m-113-D: Firmware version 4.9.114 or later

“Red Lion’s RTU is prominent in many industrial automation environments, and if an attacker can gain access to the device and execute commands as root, the potential for process disruption or damage is very high,” said Claroty.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHackers exploit cookies to target ICTBroadcast servers and gain remote shell access
Next Article Hydrogen Valley at the innovation center of the North Adriatic Sea
user
  • Website

Related Posts

How attackers can bypass synced passkeys

October 15, 2025

Two new Windows zero-days exploited – one affecting all versions shipped to date

October 15, 2025

Hackers exploit cookies to target ICTBroadcast servers and gain remote shell access

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

VSCO expands AI editing capabilities and supports RAW files

How attackers can bypass synced passkeys

Can we hear the “beat” of gravitational waves in a pulsar?

Two new Windows zero-days exploited – one affecting all versions shipped to date

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Meet Your Digital Double: FySelf Unveils TwinH, the Future of Personalized Online Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.