Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-46382: n/a

0
Unknown
VulnerabilityCVE-2023-46382cvecve-2023-46382
Published: Sat Nov 04 2023 (11/04/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) use cleartext HTTP for login.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:54:14 UTC

Technical Analysis

CVE-2023-46382 is a vulnerability affecting several LOYTEC building automation devices, including LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, and L-INX Configurator. The core issue is that these devices use unencrypted HTTP for login processes, transmitting credentials in cleartext over the network. This design flaw allows attackers with network access to perform passive interception attacks, capturing usernames and passwords without alerting the victim. Since these devices are typically deployed in building management systems controlling HVAC, lighting, and other critical infrastructure, unauthorized access could lead to manipulation of building operations or further network compromise. No CVSS score has been assigned yet, and no public exploits are known, but the vulnerability is straightforward to exploit in environments where network access is not tightly controlled. The lack of encryption violates best practices for secure device management and exposes organizations to credential theft and subsequent unauthorized device control. The vulnerability affects all versions of the listed devices, indicating a systemic issue in the product line. Mitigation is complicated by the absence of vendor patches at this time, necessitating compensating controls such as network segmentation, use of VPNs or encrypted tunnels, and disabling HTTP management interfaces where feasible. Monitoring network traffic for suspicious login attempts and enforcing strong password policies are also critical. This vulnerability highlights the importance of encrypted management protocols in operational technology environments.

Potential Impact

For European organizations, the impact of CVE-2023-46382 can be significant, especially in sectors relying heavily on building automation such as commercial real estate, manufacturing, healthcare, and public infrastructure. Intercepted credentials can lead to unauthorized access to building control systems, potentially allowing attackers to disrupt HVAC, lighting, or security systems, causing operational downtime, safety risks, and reputational damage. Confidentiality is compromised as credentials are exposed, and integrity is at risk if attackers alter device configurations. Availability could also be affected if attackers disable or manipulate devices. The vulnerability is particularly concerning in environments where network segmentation is weak or where remote access is enabled without adequate encryption. European organizations must consider the regulatory implications under GDPR if unauthorized access leads to data breaches involving personal data processed by building systems. The lack of authentication or user interaction required for exploitation increases the threat level, making it easier for attackers to gain access once network proximity is achieved. While no known exploits exist yet, the vulnerability's simplicity and the critical nature of affected systems elevate the risk profile.

Mitigation Recommendations

1. Immediately segment networks to isolate LOYTEC devices from general IT and internet-facing networks, limiting exposure to trusted personnel only. 2. Disable HTTP management interfaces on affected devices if possible, or restrict access to management ports via firewall rules and access control lists. 3. Implement VPNs or encrypted tunnels (e.g., SSH, TLS) for remote management access to ensure credentials are not transmitted in cleartext. 4. Enforce strong, unique passwords and consider multi-factor authentication if supported by the devices or management systems. 5. Monitor network traffic for unusual login attempts or unauthorized access patterns targeting these devices. 6. Engage with LOYTEC for firmware updates or patches addressing this vulnerability and plan timely deployment once available. 7. Conduct regular security audits of building automation networks to identify and remediate similar insecure configurations. 8. Educate facility management and IT teams about the risks of unencrypted management protocols and the importance of secure device configuration. 9. Consider deploying network intrusion detection systems (NIDS) capable of detecting credential interception or replay attacks. 10. Document and review incident response plans specific to building automation system compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-10-23T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690a5556a730e5a3d9d7a9fa

Added to database: 11/4/2025, 7:34:46 PM

Last enriched: 11/4/2025, 7:54:14 PM

Last updated: 11/6/2025, 10:38:05 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats