CVE-2023-46381: n/a in n/a
LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) lack authentication for the preinstalled version of LWEB-802 via an lweb802_pre/ URI. An unauthenticated attacker can edit any project (or create a new project) and control its GUI.
AI Analysis
Technical Summary
CVE-2023-46381 is a security vulnerability affecting multiple LOYTEC devices, specifically the LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, and L-INX Configurator devices. These devices come preinstalled with the LWEB-802 software, which is used for building automation and control system management. The vulnerability arises because the preinstalled version of LWEB-802 exposes an unauthenticated interface accessible via the lweb802_pre/ URI. This lack of authentication means that an attacker with network access to the device can interact with the LWEB-802 interface without any credentials. Specifically, the attacker can edit existing projects or create new projects, effectively gaining control over the device's graphical user interface (GUI). This control could allow manipulation of building automation configurations, potentially disrupting operations or causing unsafe conditions. The vulnerability affects all versions of the devices mentioned, and no patches or updates have been indicated at this time. There are no known exploits in the wild currently, but the ease of exploitation due to lack of authentication makes this a significant risk. The vulnerability does not require user interaction beyond network access, and it impacts the confidentiality, integrity, and availability of the building automation systems controlled by these devices. Given the critical role these devices play in building management, unauthorized access could lead to operational disruptions, safety hazards, or unauthorized data exposure.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for entities relying on LOYTEC devices for building automation in critical infrastructure such as commercial buildings, hospitals, data centers, and government facilities. Unauthorized control over the building automation GUI can lead to manipulation of HVAC systems, lighting, access controls, and other critical environmental controls. This could result in operational downtime, increased energy costs, or even safety incidents if environmental controls are disabled or misconfigured. Additionally, attackers could use compromised devices as footholds within internal networks, potentially escalating to broader network compromise. The lack of authentication means that any attacker with network access—whether internal or via exposed network segments—can exploit this vulnerability. This is particularly concerning for organizations with insufficient network segmentation or remote access controls. The impact extends beyond individual organizations to potentially affect public safety and critical infrastructure resilience in Europe.
Mitigation Recommendations
1. Network Segmentation: Immediately isolate affected LOYTEC devices on dedicated network segments with strict access controls to limit exposure. 2. Access Control: Restrict network access to these devices to trusted administrators only, using firewalls and VPNs where remote access is necessary. 3. Monitoring and Logging: Implement enhanced monitoring of network traffic to and from LOYTEC devices, looking for unauthorized access attempts to the lweb802_pre/ URI. 4. Device Hardening: Disable or restrict access to the LWEB-802 interface if possible, or configure devices to require authentication if supported. 5. Vendor Engagement: Contact LOYTEC for updates or patches addressing this vulnerability and apply them promptly once available. 6. Incident Response Preparation: Prepare response plans for potential exploitation scenarios, including rapid isolation and forensic analysis. 7. Physical Security: Ensure physical security controls are in place to prevent local access to devices, which could facilitate exploitation. 8. Network Access Control (NAC): Deploy NAC solutions to enforce device compliance and restrict unauthorized devices from accessing sensitive network segments hosting these devices.
Affected Countries
Germany, Austria, Switzerland, France, Netherlands, Belgium, United Kingdom, Italy, Spain, Sweden
CVE-2023-46381: n/a in n/a
Description
LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) lack authentication for the preinstalled version of LWEB-802 via an lweb802_pre/ URI. An unauthenticated attacker can edit any project (or create a new project) and control its GUI.
AI-Powered Analysis
Technical Analysis
CVE-2023-46381 is a security vulnerability affecting multiple LOYTEC devices, specifically the LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, and L-INX Configurator devices. These devices come preinstalled with the LWEB-802 software, which is used for building automation and control system management. The vulnerability arises because the preinstalled version of LWEB-802 exposes an unauthenticated interface accessible via the lweb802_pre/ URI. This lack of authentication means that an attacker with network access to the device can interact with the LWEB-802 interface without any credentials. Specifically, the attacker can edit existing projects or create new projects, effectively gaining control over the device's graphical user interface (GUI). This control could allow manipulation of building automation configurations, potentially disrupting operations or causing unsafe conditions. The vulnerability affects all versions of the devices mentioned, and no patches or updates have been indicated at this time. There are no known exploits in the wild currently, but the ease of exploitation due to lack of authentication makes this a significant risk. The vulnerability does not require user interaction beyond network access, and it impacts the confidentiality, integrity, and availability of the building automation systems controlled by these devices. Given the critical role these devices play in building management, unauthorized access could lead to operational disruptions, safety hazards, or unauthorized data exposure.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for entities relying on LOYTEC devices for building automation in critical infrastructure such as commercial buildings, hospitals, data centers, and government facilities. Unauthorized control over the building automation GUI can lead to manipulation of HVAC systems, lighting, access controls, and other critical environmental controls. This could result in operational downtime, increased energy costs, or even safety incidents if environmental controls are disabled or misconfigured. Additionally, attackers could use compromised devices as footholds within internal networks, potentially escalating to broader network compromise. The lack of authentication means that any attacker with network access—whether internal or via exposed network segments—can exploit this vulnerability. This is particularly concerning for organizations with insufficient network segmentation or remote access controls. The impact extends beyond individual organizations to potentially affect public safety and critical infrastructure resilience in Europe.
Mitigation Recommendations
1. Network Segmentation: Immediately isolate affected LOYTEC devices on dedicated network segments with strict access controls to limit exposure. 2. Access Control: Restrict network access to these devices to trusted administrators only, using firewalls and VPNs where remote access is necessary. 3. Monitoring and Logging: Implement enhanced monitoring of network traffic to and from LOYTEC devices, looking for unauthorized access attempts to the lweb802_pre/ URI. 4. Device Hardening: Disable or restrict access to the LWEB-802 interface if possible, or configure devices to require authentication if supported. 5. Vendor Engagement: Contact LOYTEC for updates or patches addressing this vulnerability and apply them promptly once available. 6. Incident Response Preparation: Prepare response plans for potential exploitation scenarios, including rapid isolation and forensic analysis. 7. Physical Security: Ensure physical security controls are in place to prevent local access to devices, which could facilitate exploitation. 8. Network Access Control (NAC): Deploy NAC solutions to enforce device compliance and restrict unauthorized devices from accessing sensitive network segments hosting these devices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-10-23T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d983ac4522896dcbed0f8
Added to database: 5/21/2025, 9:09:14 AM
Last enriched: 6/25/2025, 4:50:51 PM
Last updated: 7/29/2025, 11:33:11 PM
Views: 12
Related Threats
CVE-2025-9013: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumCVE-2025-9012: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumCVE-2025-9011: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumCVE-2025-9010: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-9009: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.