CVE-2023-45735

8.0 HIGH

📋 TL;DR

This vulnerability in Westermo Lynx devices allows attackers with device access to execute arbitrary code, potentially compromising device functionality. It affects organizations using these industrial networking devices, particularly in critical infrastructure sectors.

💻 Affected Systems

Products:
  • Westermo Lynx devices
Versions: Specific versions not detailed in advisory; check vendor documentation
Operating Systems: Embedded OS on Westermo devices
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the device; industrial control systems using these devices are particularly at risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to disruption of industrial operations, data exfiltration, or lateral movement within operational technology networks.

🟠

Likely Case

Local privilege escalation allowing attackers to modify device configurations, disrupt network communications, or install persistent backdoors.

🟢

If Mitigated

Limited impact if devices are properly segmented and access controls prevent unauthorized local access.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the device; no public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Westermo security advisory for specific patched versions

Vendor Advisory: https://www.westermo.com/security-advisories

Restart Required: Yes

Instructions:

1. Check current device firmware version. 2. Download latest firmware from Westermo support portal. 3. Follow vendor's firmware update procedure. 4. Verify successful update and restart device.

🔧 Temporary Workarounds

Restrict Physical and Network Access

all

Limit who can physically access devices and implement network segmentation

Implement Least Privilege Access

all

Ensure only authorized personnel have administrative access to devices

🧯 If You Can't Patch

  • Isolate vulnerable devices in separate network segments with strict firewall rules
  • Implement continuous monitoring for unusual device behavior or configuration changes

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against vendor's vulnerable version list

Check Version:

Device-specific command via serial console or web interface (consult device manual)

Verify Fix Applied:

Confirm firmware version matches patched version from vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • Configuration changes without authorization
  • Unusual login attempts

Network Indicators:

  • Unexpected outbound connections from devices
  • Anomalous traffic patterns

SIEM Query:

source="westermo-lynx" AND (event_type="config_change" OR event_type="reboot")

🔗 References

📤 Share & Export