CVE-2023-46385

7.5 HIGH

📋 TL;DR

LOYTEC LINX Configurator transmits admin credentials as unencrypted URL parameters, allowing attackers to intercept and steal passwords. This vulnerability affects all versions of LOYTEC electronics GmbH LINX Configurator software, enabling full control of Loytec device configurations.

💻 Affected Systems

Products:
  • LOYTEC electronics GmbH LINX Configurator
Versions: All versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the configuration software used to manage Loytec building automation devices.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to building automation systems, allowing them to modify configurations, disrupt operations, or cause physical damage to connected devices.

🟠

Likely Case

Credential theft leading to unauthorized access to Loytec device configurations, potentially enabling manipulation of building automation systems.

🟢

If Mitigated

Limited impact if network segmentation prevents external access and credential rotation is implemented after potential exposure.

🌐 Internet-Facing: HIGH - Any internet-exposed instances transmit credentials in cleartext that can be intercepted.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still intercept credentials transmitted over the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to intercept traffic or access to URL history/logs containing credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None available

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01

Restart Required: No

Instructions:

No official patch available. Follow workarounds and mitigation steps below.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate LINX Configurator systems from untrusted networks and internet access.

Credential Rotation

all

Change all admin passwords used with LINX Configurator immediately.

🧯 If You Can't Patch

  • Implement strict network access controls to prevent external access to LINX Configurator instances
  • Monitor network traffic for URL parameters containing credential strings and implement credential rotation policies

🔍 How to Verify

Check if Vulnerable:

Check if LINX Configurator transmits credentials as URL parameters by examining network traffic or application logs.

Check Version:

Check version in LINX Configurator application interface or installation directory.

Verify Fix Applied:

Verify no credentials appear in URL parameters during authentication by monitoring network traffic.

📡 Detection & Monitoring

Log Indicators:

  • URL parameters containing 'password', 'admin', or credential-like strings in web server or application logs

Network Indicators:

  • HTTP/HTTPS traffic containing credential parameters in URLs to LINX Configurator endpoints

SIEM Query:

search 'LINX Configurator' AND (password OR admin) IN url_parameters

🔗 References

📤 Share & Export