Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-46381: n/a

0
Unknown
VulnerabilityCVE-2023-46381cvecve-2023-46381
Published: Sat Nov 04 2023 (11/04/2023, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) lack authentication for the preinstalled version of LWEB-802 via an lweb802_pre/ URI. An unauthenticated attacker can edit any project (or create a new project) and control its GUI.

AI-Powered Analysis

AILast updated: 11/04/2025, 23:47:15 UTC

Technical Analysis

CVE-2023-46381 identifies a critical security vulnerability in several LOYTEC LINX devices, including LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, and the L-INX Configurator. These devices come with a preinstalled version of the LWEB-802 software, which exposes an unauthenticated endpoint accessible via the lweb802_pre/ URI. Due to the absence of authentication controls on this endpoint, an attacker can remotely access the device's project management interface without any credentials. This access allows the attacker to edit existing projects or create new ones, effectively gaining control over the device's graphical user interface (GUI) and potentially altering building automation configurations. Such unauthorized modifications could disrupt normal operations, cause safety hazards, or facilitate further attacks within the network. The vulnerability affects all versions of the listed devices, indicating a widespread exposure. While no public exploits have been reported, the ease of exploitation—requiring no authentication or user interaction—makes this a significant risk. The vulnerability was published on November 4, 2023, and is recognized by CISA as an enriched threat. No CVSS score has been assigned yet, but the technical details highlight a critical security gap in the authentication mechanism of these building automation devices.

Potential Impact

For European organizations, the impact of CVE-2023-46381 can be substantial, particularly for those relying on LOYTEC devices for building automation, HVAC control, lighting, and other facility management functions. Unauthorized access to these systems could lead to operational disruptions, safety risks, and potential physical damage if critical environmental controls are manipulated. Industrial facilities, commercial real estate, hospitals, and data centers could face downtime or compromised safety systems. Furthermore, attackers could use these devices as footholds for lateral movement within corporate networks, increasing the risk of broader cyber intrusions. The lack of authentication means that any attacker with network access to these devices can exploit the vulnerability, increasing the attack surface in environments where network segmentation or access controls are weak. This could also lead to reputational damage and regulatory compliance issues under GDPR and other European cybersecurity regulations if sensitive operational data is compromised or if service disruptions occur.

Mitigation Recommendations

To mitigate CVE-2023-46381, organizations should immediately restrict network access to affected LOYTEC devices by implementing strict firewall rules and network segmentation, isolating building automation systems from general IT networks and the internet. Deploy VPNs or secure tunnels for remote management to prevent unauthorized access. Regularly audit device configurations and monitor network traffic for unusual activity targeting the lweb802_pre/ URI or related endpoints. If possible, update devices with vendor patches or firmware updates once available. In the absence of patches, consider disabling or restricting access to the vulnerable LWEB-802 interface. Employ strong network access controls and multi-factor authentication for any management interfaces. Conduct security awareness training for facility management teams to recognize and report suspicious activity. Finally, maintain an inventory of all LOYTEC devices and their firmware versions to prioritize remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-10-23T00:00:00.000Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed0f8

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 11/4/2025, 11:47:15 PM

Last updated: 12/5/2025, 12:46:06 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats