CVE-2023-40151

10.0 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authentication and execute arbitrary commands with highest privileges on Red Lion SixTRAK and VersaTRAK RTUs. It affects systems where user authentication is enabled but TCP/IP connections are accepted without proper authentication challenges. Industrial control system operators using these RTUs are affected.

💻 Affected Systems

Products:
  • Red Lion SixTRAK Series RTUs
  • Red Lion VersaTRAK Series RTUs
Versions: All versions prior to patched firmware
Operating Systems: RTU firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable when user authentication is enabled (UDR-A configuration). UDP connections properly challenge authentication, but TCP connections bypass it.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing remote code execution with highest privileges, enabling attackers to manipulate industrial processes, disrupt operations, or cause physical damage.

🟠

Likely Case

Unauthorized access to RTU systems allowing configuration changes, data manipulation, or denial of service affecting industrial operations.

🟢

If Mitigated

Limited impact if proper network segmentation and authentication controls prevent unauthorized TCP/IP access to RTUs.

🌐 Internet-Facing: HIGH - RTUs exposed to internet are directly vulnerable to unauthenticated attacks via TCP/IP connections.
🏢 Internal Only: HIGH - Even internally, any system with network access to RTUs can exploit this vulnerability without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending Sixnet UDR messages over TCP/IP to vulnerable RTUs. No authentication needed when using TCP instead of UDP.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific firmware versions

Vendor Advisory: https://support.redlion.net/hc/en-us/articles/19339209248269-RLCSIM-2023-05-Authentication-Bypass-and-Remote-Code-Execution

Restart Required: Yes

Instructions:

1. Download latest firmware from Red Lion support portal. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Verify authentication works correctly for both UDP and TCP connections.

🔧 Temporary Workarounds

Disable TCP/IP access

all

Block or disable TCP/IP connections to RTUs, forcing all communication through UDP which properly challenges authentication.

Configure firewall rules to block TCP port 789 (default Sixnet port) to RTUs
Disable TCP/IP services on RTU if possible

Network segmentation

all

Isolate RTUs in separate network segments with strict access controls.

Implement VLAN segmentation
Configure firewall rules to restrict RTU access to authorized systems only

🧯 If You Can't Patch

  • Implement strict network access controls to limit TCP connections to RTUs from trusted sources only
  • Monitor network traffic for unauthorized TCP connections to RTU ports and implement intrusion detection

🔍 How to Verify

Check if Vulnerable:

Test if Sixnet UDR messages sent over TCP/IP bypass authentication when UDP connections properly challenge it.

Check Version:

Check RTU firmware version through web interface or serial console (vendor-specific commands)

Verify Fix Applied:

Verify that TCP connections now require proper authentication and cannot execute privileged commands without credentials.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized TCP connections to RTU ports
  • Authentication bypass attempts
  • Privileged command execution from unexpected sources

Network Indicators:

  • TCP traffic to port 789 (default Sixnet) without preceding authentication
  • UDR protocol messages over TCP from unauthorized sources

SIEM Query:

source_ip NOT IN authorized_list AND dest_port=789 AND protocol=TCP

🔗 References

📤 Share & Export