CVE-2020-27285

9.1 CRITICAL

📋 TL;DR

CVE-2020-27285 is an authentication bypass vulnerability in Crimson 3.1 software that allows unauthenticated users to read and modify the database. This affects industrial control systems using Crimson 3.1 versions prior to 3119.001 with default configurations.

💻 Affected Systems

Products:
  • Red Lion Crimson 3.1
Versions: All versions prior to 3119.001
Operating Systems: Windows (for Crimson software)
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the default configuration of Crimson 3.1 software used for industrial control systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems allowing attackers to modify critical process parameters, disrupt operations, or cause physical damage.

🟠

Likely Case

Unauthorized access to sensitive industrial data, configuration tampering, and potential operational disruption.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to vulnerable systems.

🌐 Internet-Facing: HIGH - Direct internet exposure allows complete system compromise without authentication.
🏢 Internal Only: HIGH - Even internal attackers or malware can exploit this without credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities are typically easy to exploit once discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3119.001 or later

Vendor Advisory: https://www.redlion.net/support/security-advisories

Restart Required: Yes

Instructions:

1. Download Crimson 3.1 version 3119.001 or later from Red Lion support portal. 2. Backup current configurations. 3. Install the update following vendor instructions. 4. Restart affected systems. 5. Verify authentication is now required for database access.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Crimson systems from untrusted networks using firewalls.

Access Control Lists

all

Implement strict network access controls to limit connections to Crimson systems.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems
  • Deploy intrusion detection systems to monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check Crimson 3.1 version in software interface. If version is below 3119.001, system is vulnerable.

Check Version:

Check version in Crimson 3.1 software interface under Help > About

Verify Fix Applied:

Verify version is 3119.001 or later and test that authentication is required for database access.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated database access attempts
  • Configuration changes without authentication logs

Network Indicators:

  • Unusual database queries from unauthorized IPs
  • Traffic to Crimson database ports without authentication

SIEM Query:

source="crimson_logs" AND (event_type="database_access" AND auth_status="none")

🔗 References

📤 Share & Export