CVE-2023-46381: n/a
LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) lack authentication for the preinstalled version of LWEB-802 via an lweb802_pre/ URI. An unauthenticated attacker can edit any project (or create a new project) and control its GUI.
AI Analysis
Technical Summary
CVE-2023-46381 identifies a critical security vulnerability in several LOYTEC LINX devices, including LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, and the L-INX Configurator. These devices come with a preinstalled version of the LWEB-802 software, which exposes an unauthenticated endpoint accessible via the lweb802_pre/ URI. Due to the absence of authentication controls on this endpoint, an attacker can remotely access the device's project management interface without any credentials. This access allows the attacker to edit existing projects or create new ones, effectively gaining control over the device's graphical user interface (GUI) and potentially altering building automation configurations. Such unauthorized modifications could disrupt normal operations, cause safety hazards, or facilitate further attacks within the network. The vulnerability affects all versions of the listed devices, indicating a widespread exposure. While no public exploits have been reported, the ease of exploitation—requiring no authentication or user interaction—makes this a significant risk. The vulnerability was published on November 4, 2023, and is recognized by CISA as an enriched threat. No CVSS score has been assigned yet, but the technical details highlight a critical security gap in the authentication mechanism of these building automation devices.
Potential Impact
For European organizations, the impact of CVE-2023-46381 can be substantial, particularly for those relying on LOYTEC devices for building automation, HVAC control, lighting, and other facility management functions. Unauthorized access to these systems could lead to operational disruptions, safety risks, and potential physical damage if critical environmental controls are manipulated. Industrial facilities, commercial real estate, hospitals, and data centers could face downtime or compromised safety systems. Furthermore, attackers could use these devices as footholds for lateral movement within corporate networks, increasing the risk of broader cyber intrusions. The lack of authentication means that any attacker with network access to these devices can exploit the vulnerability, increasing the attack surface in environments where network segmentation or access controls are weak. This could also lead to reputational damage and regulatory compliance issues under GDPR and other European cybersecurity regulations if sensitive operational data is compromised or if service disruptions occur.
Mitigation Recommendations
To mitigate CVE-2023-46381, organizations should immediately restrict network access to affected LOYTEC devices by implementing strict firewall rules and network segmentation, isolating building automation systems from general IT networks and the internet. Deploy VPNs or secure tunnels for remote management to prevent unauthorized access. Regularly audit device configurations and monitor network traffic for unusual activity targeting the lweb802_pre/ URI or related endpoints. If possible, update devices with vendor patches or firmware updates once available. In the absence of patches, consider disabling or restricting access to the vulnerable LWEB-802 interface. Employ strong network access controls and multi-factor authentication for any management interfaces. Conduct security awareness training for facility management teams to recognize and report suspicious activity. Finally, maintain an inventory of all LOYTEC devices and their firmware versions to prioritize remediation efforts.
Affected Countries
Germany, Austria, Switzerland, France, Netherlands, Belgium, United Kingdom, Italy
CVE-2023-46381: n/a
Description
LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) lack authentication for the preinstalled version of LWEB-802 via an lweb802_pre/ URI. An unauthenticated attacker can edit any project (or create a new project) and control its GUI.
AI-Powered Analysis
Technical Analysis
CVE-2023-46381 identifies a critical security vulnerability in several LOYTEC LINX devices, including LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, and the L-INX Configurator. These devices come with a preinstalled version of the LWEB-802 software, which exposes an unauthenticated endpoint accessible via the lweb802_pre/ URI. Due to the absence of authentication controls on this endpoint, an attacker can remotely access the device's project management interface without any credentials. This access allows the attacker to edit existing projects or create new ones, effectively gaining control over the device's graphical user interface (GUI) and potentially altering building automation configurations. Such unauthorized modifications could disrupt normal operations, cause safety hazards, or facilitate further attacks within the network. The vulnerability affects all versions of the listed devices, indicating a widespread exposure. While no public exploits have been reported, the ease of exploitation—requiring no authentication or user interaction—makes this a significant risk. The vulnerability was published on November 4, 2023, and is recognized by CISA as an enriched threat. No CVSS score has been assigned yet, but the technical details highlight a critical security gap in the authentication mechanism of these building automation devices.
Potential Impact
For European organizations, the impact of CVE-2023-46381 can be substantial, particularly for those relying on LOYTEC devices for building automation, HVAC control, lighting, and other facility management functions. Unauthorized access to these systems could lead to operational disruptions, safety risks, and potential physical damage if critical environmental controls are manipulated. Industrial facilities, commercial real estate, hospitals, and data centers could face downtime or compromised safety systems. Furthermore, attackers could use these devices as footholds for lateral movement within corporate networks, increasing the risk of broader cyber intrusions. The lack of authentication means that any attacker with network access to these devices can exploit the vulnerability, increasing the attack surface in environments where network segmentation or access controls are weak. This could also lead to reputational damage and regulatory compliance issues under GDPR and other European cybersecurity regulations if sensitive operational data is compromised or if service disruptions occur.
Mitigation Recommendations
To mitigate CVE-2023-46381, organizations should immediately restrict network access to affected LOYTEC devices by implementing strict firewall rules and network segmentation, isolating building automation systems from general IT networks and the internet. Deploy VPNs or secure tunnels for remote management to prevent unauthorized access. Regularly audit device configurations and monitor network traffic for unusual activity targeting the lweb802_pre/ URI or related endpoints. If possible, update devices with vendor patches or firmware updates once available. In the absence of patches, consider disabling or restricting access to the vulnerable LWEB-802 interface. Employ strong network access controls and multi-factor authentication for any management interfaces. Conduct security awareness training for facility management teams to recognize and report suspicious activity. Finally, maintain an inventory of all LOYTEC devices and their firmware versions to prioritize remediation efforts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-10-23T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d983ac4522896dcbed0f8
Added to database: 5/21/2025, 9:09:14 AM
Last enriched: 11/4/2025, 11:47:15 PM
Last updated: 12/5/2025, 12:46:06 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14052: Improper Access Controls in youlaitech youlai-mall
MediumCVE-2025-13373: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Advantech iView
HighCVE-2025-66564: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore timestamp-authority
HighCVE-2025-66559: CWE-129: Improper Validation of Array Index in taikoxyz taiko-mono
HighCVE-2025-66563: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in monkeytypegame monkeytype
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.