Skip to main content

CVE-2023-45213: CWE-942: Permissive Cross-domain Policy with Untrusted Domains in Westermo Lynx

Medium
VulnerabilityCVE-2023-45213cvecve-2023-45213cwe-942
Published: Tue Feb 06 2024 (02/06/2024, 21:39:36 UTC)
Source: CVE
Vendor/Project: Westermo
Product: Lynx

Description

A potential attacker with access to the Westermo Lynx device would be able to execute malicious code that could affect the correct functioning of the device.

AI-Powered Analysis

AILast updated: 07/04/2025, 18:42:01 UTC

Technical Analysis

CVE-2023-45213 is a medium-severity vulnerability affecting the Westermo Lynx industrial networking device, specifically versions L206-F2G1 and 4.24. The vulnerability is classified under CWE-942, which refers to a permissive cross-domain policy that allows untrusted domains. This misconfiguration enables a potential attacker who has access to the device to execute malicious code that can disrupt the device's normal operation. The vulnerability arises because the device's cross-domain policy does not sufficiently restrict which domains can interact with it, thereby allowing malicious web content or scripts from untrusted domains to execute code within the device's context. The CVSS v3.1 score is 6.6, reflecting a medium severity with the vector indicating that the attack requires adjacent network access (AV:A), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is needed (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The impact on confidentiality is high (C:H), but integrity and availability impacts are none (I:N, A:N). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is particularly relevant in industrial control systems (ICS) environments where Westermo Lynx devices are deployed to manage critical network infrastructure. An attacker exploiting this flaw could execute malicious code that may interfere with device functionality, potentially leading to operational disruptions or unauthorized data exposure within industrial networks.

Potential Impact

For European organizations, especially those operating in critical infrastructure sectors such as energy, transportation, manufacturing, and utilities, this vulnerability poses a significant risk. Westermo Lynx devices are commonly used in industrial networking for secure and reliable communication. Exploitation could lead to unauthorized code execution, which may disrupt network operations or cause device malfunctions. Given the high confidentiality impact, sensitive operational data could be exposed, potentially leading to industrial espionage or sabotage. The requirement for adjacent network access limits remote exploitation but does not eliminate risk, as attackers with internal network access or via compromised devices could leverage this vulnerability. Disruptions in industrial control systems can have cascading effects on production lines, safety systems, and service availability, which are critical for European economies and public safety. Additionally, the changed scope indicates that exploitation could affect other components or systems beyond the Lynx device itself, increasing the potential damage. The absence of known exploits suggests that immediate widespread attacks are unlikely, but the vulnerability should be addressed proactively to prevent future exploitation.

Mitigation Recommendations

European organizations should implement a multi-layered approach to mitigate this vulnerability. First, restrict network access to Westermo Lynx devices by segmenting industrial networks and enforcing strict access controls, limiting device exposure to only trusted management stations and systems. Deploy network monitoring and anomaly detection tools to identify unusual activities that could indicate exploitation attempts. Since no official patch is currently available, organizations should contact Westermo for guidance and monitor for firmware updates addressing this issue. Review and harden cross-domain policies and configurations on affected devices to ensure only trusted domains are permitted, reducing the attack surface. Employ strict user interaction policies and educate personnel about the risks of interacting with untrusted content that could trigger exploitation. Additionally, implement robust incident response plans tailored to industrial environments to quickly contain and remediate any compromise. Regularly audit device configurations and network architecture to ensure compliance with security best practices and minimize lateral movement opportunities for attackers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2023-10-12T20:21:27.727Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec319

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:42:01 PM

Last updated: 8/6/2025, 8:18:39 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats