CVE-2023-46387
📋 TL;DR
LOYTEC LINX-212 and LINX-151 automation servers have an incorrect access control vulnerability in the dpal_config.zml file that allows remote attackers to read sensitive data point configuration information. This affects all versions of these devices. Building automation systems using these devices are vulnerable to information disclosure.
💻 Affected Systems
- LOYTEC LINX-212
- LOYTEC LINX-151
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain complete access to building automation system configuration, potentially enabling manipulation of physical systems like HVAC, lighting, or security controls.
Likely Case
Sensitive configuration data including data point names, addresses, and potentially credentials are exposed, enabling reconnaissance for further attacks.
If Mitigated
Limited information disclosure with no direct system control, but still reveals system architecture.
🎯 Exploit Status
Exploit involves simple HTTP request to access dpal_config.zml file. Public proof-of-concept code exists in Packet Storm references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: None available
Vendor Advisory: No vendor advisory found in provided references
Restart Required: No
Instructions:
No official patch available. Refer to workarounds and mitigation steps.
🔧 Temporary Workarounds
Network Segmentation
allIsolate LOYTEC devices on separate VLAN with strict firewall rules preventing external access.
Access Control Lists
allImplement network ACLs to restrict access to LOYTEC devices only from authorized management stations.
🧯 If You Can't Patch
- Segment devices on isolated network with no internet access
- Implement strict firewall rules blocking all unnecessary ports to LOYTEC devices
🔍 How to Verify
Check if Vulnerable:
Attempt HTTP GET request to http://[device_ip]/dpal_config.zml - if file downloads, device is vulnerable.
Check Version:
Check device web interface or use SNMP query to device for firmware version
Verify Fix Applied:
After implementing network controls, verify HTTP GET to dpal_config.zml returns 403/404 or connection refused.
📡 Detection & Monitoring
Log Indicators:
- HTTP GET requests to /dpal_config.zml
- Unusual access from unauthorized IP addresses
Network Indicators:
- HTTP traffic to LOYTEC devices on unusual ports
- Multiple failed access attempts followed by successful dpal_config.zml download
SIEM Query:
source_ip=* dest_ip=[LOYTEC_IP] http_uri="/dpal_config.zml"
🔗 References
- http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html
- http://seclists.org/fulldisclosure/2023/Nov/7
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01
- https://www.txone.com/blog/ten-unpatched-vulnerabilities-in-building-automation-products-identified-by-txone-networks/
- http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html
- http://seclists.org/fulldisclosure/2023/Nov/7
- https://www.txone.com/blog/ten-unpatched-vulnerabilities-in-building-automation-products-identified-by-txone-networks/