Industrial Cybersecurity Firm Discloses 10 Unpatched Vulnerabilities in Loytec Building Automation Products

Industrial cybersecurity firm TXOne Networks recently revealed the existence of ten unpatched vulnerabilities in building automation products developed by Loytec, an Austrian company. These vulnerabilities, discovered over two years ago by TXOne’s researchers, pose a significant risk to the security and integrity of building automation systems. In this article, we will delve into the details of these vulnerabilities, their potential impact, and the urgent need for patching and securing affected systems.

Vulnerability details and disclosure

The vulnerabilities identified by TXOne Networks have been assigned the identifiers CVE-2023-46380 through CVE-2023-46389. These details were publicly disclosed in three separate advisories that the company published on the Full Disclosure mailing list back in November. The vulnerabilities primarily relate to the transmission and storage of usernames and passwords in clear text, lack of proper authentication mechanisms, exposure of admin passwords in a registry key, and the potential exposure of sensitive information.

Affected products

The vulnerabilities reported by TXOne Networks impact several Loytec building automation products. These include the LINX-212, LINX-151, and LIOB-586 programmable automation stations responsible for controlling various building applications. Additionally, the LVIS-3ME12-A1 touch panels, LWEB-802 visualization tool, and the L-INX Configurator configuration tool are also affected.

Potential impact

Exploiting these vulnerabilities could allow an attacker, in some cases even without authentication, to take control of the targeted building automation system. Once compromised, the attacker could proceed to disable security systems and alarms, leading to potentially severe consequences. This highlights the critical nature of addressing these vulnerabilities promptly.

Complexity of exploitation

While some of the vulnerabilities can be exploited relatively easily, others require more sophisticated techniques. Certain vulnerabilities can only be exploited through a man-in-the-middle (MitM) attack on the network or local access to the affected Loytec products. These additional requirements for exploitation serve as obstacles, but they still emphasize the importance of securing systems and preventing unauthorized access.

MitM attack and sensitive data access

Vulnerabilities such as CVE-2023-46380, CVE-2023-46382, CVE-2023-46383, and CVE-2023-46385 specifically require a MitM position on the network to successfully read sensitive data, such as cleartext passwords. These vulnerabilities emphasize the importance of implementing strong encryption protocols and securing network communications within building automation systems.

Easy access through exposed web user interface

One of the vulnerabilities, CVE-2023-46382, poses a significant risk due to its exploitable nature. This vulnerability does not require any technical skills to exploit. If the web user interface of the preinstalled version of LWEB-802 is exposed to the internet, anyone with access can easily enter and assume control. This emphasizes the importance of proper network configuration and applying appropriate access controls.

Access to sensitive files as an administrator

For CVE-2023-46387 and CVE-2023-46389, the ability to access sensitive files containing SMTP client credentials used for alert and report functions requires an attacker to gain administrator-level access. However, once an attacker successfully achieves administrative privileges, these files can be easily accessed, leading to potential misuse or unauthorized disclosure of sensitive information.

Reporting and vendor response

TXOne Networks initially reported these vulnerabilities to Loytec through Trend Micro’s Zero Day Initiative (ZDI) in October 2021. Shockingly, the US cybersecurity agency, CISA, attempted to contact Loytec a year later, highlighting potential delays in the vendor’s response to critical security concerns. It is imperative that vendors promptly address reported vulnerabilities to safeguard their customers’ systems.

The unpatched vulnerabilities discovered in Loytec building automation products by TXOne Networks represent a significant threat to industrial cybersecurity. Urgent action is needed to identify and mitigate these vulnerabilities, ensuring the security and integrity of building automation systems. Vendors must respond swiftly to vulnerability reports and patch their products, while end-users and system administrators should promptly apply patches and implement robust security measures to safeguard their critical infrastructure from potential compromise and unauthorized access. By prioritizing cybersecurity and fostering collaboration between cybersecurity researchers and manufacturers, we can collectively enhance the resilience of our critical infrastructures, guarding against potential cyber threats that could have severe consequences.

Explore more

Why Are Small Businesses Losing Confidence in Marketing?

In the ever-evolving landscape of commerce, small and mid-sized businesses (SMBs) globally are grappling with a perplexing challenge: despite pouring more time, energy, and resources into marketing, their confidence in achieving impactful results is waning, and recent findings reveal a stark reality where only a fraction of these businesses feel assured about their strategies. Many struggle to measure success or

How Are AI Agents Revolutionizing Chatbot Marketing?

In an era where digital interaction shapes customer expectations, Artificial Intelligence (AI) is fundamentally altering the landscape of chatbot marketing with unprecedented advancements. Once limited to answering basic queries through rigid scripts, chatbots have evolved into sophisticated AI agents capable of managing intricate workflows and delivering seamless engagement. Innovations like Silverback AI Chatbot’s updated framework exemplify this transformation, pushing the

How Does Klaviyo Lead AI-Driven B2C Marketing in 2025?

In today’s rapidly shifting landscape of business-to-consumer (B2C) marketing, artificial intelligence (AI) has emerged as a pivotal force, reshaping how brands forge connections with their audiences. At the forefront of this transformation stands Klaviyo, a marketing platform that has solidified its reputation as an industry pioneer. By harnessing sophisticated AI technologies, Klaviyo enables companies to craft highly personalized customer experiences,

How Does Azure’s Trusted Launch Upgrade Enhance Security?

In an era where cyber threats are becoming increasingly sophisticated, businesses running workloads in the cloud face constant challenges in safeguarding their virtual environments from advanced attacks like bootkits and firmware exploits. A significant step forward in addressing these concerns has emerged with a recent update from Microsoft, introducing in-place upgrades for a key security feature on Azure Virtual Machines

How Does Digi Power X Lead with ARMS 200 AI Data Centers?

In an era where artificial intelligence is reshaping industries at an unprecedented pace, the demand for robust, reliable, and scalable data center infrastructure has never been higher, and Digi Power X is stepping up to meet this challenge head-on with innovative solutions. This NASDAQ-listed energy infrastructure company, under the ticker DGXX, recently made headlines with a groundbreaking achievement through its