CVE-2023-5719
📋 TL;DR
CVE-2023-5719 is a password handling vulnerability in Crimson 3.2 Windows configuration tool where passwords containing percent (%) characters get truncated during configuration download, potentially creating weaker credentials. This affects administrators using the Windows configuration tool to set passwords on Red Lion devices. Passwords set via the web interface are not vulnerable.
💻 Affected Systems
- Red Lion Crimson 3.2 Windows Configuration Tool
📦 What is this software?
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
Crimson by Redlion
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain administrative access to industrial control systems by exploiting weak truncated passwords, potentially leading to operational disruption, data manipulation, or safety incidents.
Likely Case
Unauthorized access to device configuration and control functions if weak passwords are created and not detected by administrators.
If Mitigated
Limited impact with proper password policies and monitoring, as the vulnerability requires administrative access to trigger and creates detectable weak passwords.
🎯 Exploit Status
Exploitation requires administrative access to create weak passwords and knowledge of the resulting truncated password.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Crimson 3.2 SR1 or later
Vendor Advisory: https://support.redlion.net/hc/en-us/categories/360002087671-Security-Advisories
Restart Required: No
Instructions:
1. Download Crimson 3.2 SR1 or later from Red Lion support portal. 2. Install the updated version. 3. Verify all passwords set via Windows tool do not contain % characters.
🔧 Temporary Workarounds
Avoid Percent Characters in Passwords
windowsDo not use passwords containing percent (%) characters when setting passwords via the Windows configuration tool.
Use Web Interface for Password Management
allSet all passwords using the Crimson system web server interface instead of the Windows configuration tool.
🧯 If You Can't Patch
- Audit all passwords set via Windows configuration tool for % characters and change any found
- Implement strict password policies prohibiting special characters that cause truncation
🔍 How to Verify
Check if Vulnerable:
Check if using Crimson 3.2 Windows configuration tool and if any passwords contain % characters set via this tool.
Check Version:
Check Crimson About dialog or installation details for version information
Verify Fix Applied:
Verify Crimson version is 3.2 SR1 or later and test password setting with % characters to confirm no truncation.
📡 Detection & Monitoring
Log Indicators:
- Failed login attempts with truncated passwords
- Configuration changes via Windows tool with special characters
Network Indicators:
- Unusual authentication patterns to Crimson devices
SIEM Query:
source="crimson" AND (event="password_change" OR event="failed_login") AND message="%"