CVE-2023-22807

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to send malicious packets via the XGT protocol to LS ELECTRIC XBC-DN32U PLCs, enabling complete control and tampering with industrial processes. It affects LS ELECTRIC XBC-DN32U programmable logic controllers running operating system version 01.80. Organizations using these PLCs in industrial control systems are at risk.

💻 Affected Systems

Products:
  • LS ELECTRIC XBC-DN32U
Versions: Operating system version 01.80
Operating Systems: LS ELECTRIC PLC operating system
Default Config Vulnerable: ⚠️ Yes
Notes: All XBC-DN32U devices running OS version 01.80 are vulnerable in default configuration when network accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete takeover of industrial processes leading to physical damage, production shutdowns, safety system compromise, or environmental harm.

🟠

Likely Case

Unauthorized manipulation of PLC logic, process disruption, data manipulation, or denial of service affecting industrial operations.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only reconnaissance or failed exploitation attempts.

🌐 Internet-Facing: HIGH - If PLCs are directly exposed to the internet, attackers can exploit remotely without authentication.
🏢 Internal Only: HIGH - Even internally, any network-accessible PLC is vulnerable to exploitation from compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted XGT protocol packets to the PLC, which is documented in vendor manuals.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact LS ELECTRIC for updated firmware

Vendor Advisory: https://www.lselectric.com/security (check for specific advisory)

Restart Required: Yes

Instructions:

1. Contact LS ELECTRIC for updated firmware
2. Backup PLC program and configuration
3. Apply firmware update following vendor instructions
4. Restart PLC
5. Verify functionality

🔧 Temporary Workarounds

Network Segmentation

all

Isolate PLCs in dedicated industrial network segments with strict firewall rules

Access Control Lists

all

Implement network ACLs to restrict XGT protocol access to authorized systems only

🧯 If You Can't Patch

  • Implement strict network segmentation with industrial firewalls
  • Monitor network traffic for XGT protocol anomalies and unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check PLC OS version via programming software or HMI interface - if version is 01.80, device is vulnerable

Check Version:

Use LS ELECTRIC XG5000 programming software to read PLC information and check OS version

Verify Fix Applied:

Verify OS version has been updated to a version later than 01.80 via programming software

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized XGT protocol connections
  • PLC program modification logs
  • Unexpected PLC stop/start events

Network Indicators:

  • XGT protocol traffic from unauthorized IP addresses
  • Unusual XGT command patterns
  • High volume of XGT packets

SIEM Query:

source_ip NOT IN (authorized_plc_ips) AND protocol=XGT AND dest_port=2004

🔗 References

📤 Share & Export