Industrial Cybersecurity Firm Discloses 10 Unpatched Vulnerabilities in Loytec Building Automation Products

Industrial cybersecurity firm TXOne Networks recently revealed the existence of ten unpatched vulnerabilities in building automation products developed by Loytec, an Austrian company. These vulnerabilities, discovered over two years ago by TXOne’s researchers, pose a significant risk to the security and integrity of building automation systems. In this article, we will delve into the details of these vulnerabilities, their potential impact, and the urgent need for patching and securing affected systems.

Vulnerability details and disclosure

The vulnerabilities identified by TXOne Networks have been assigned the identifiers CVE-2023-46380 through CVE-2023-46389. These details were publicly disclosed in three separate advisories that the company published on the Full Disclosure mailing list back in November. The vulnerabilities primarily relate to the transmission and storage of usernames and passwords in clear text, lack of proper authentication mechanisms, exposure of admin passwords in a registry key, and the potential exposure of sensitive information.

Affected products

The vulnerabilities reported by TXOne Networks impact several Loytec building automation products. These include the LINX-212, LINX-151, and LIOB-586 programmable automation stations responsible for controlling various building applications. Additionally, the LVIS-3ME12-A1 touch panels, LWEB-802 visualization tool, and the L-INX Configurator configuration tool are also affected.

Potential impact

Exploiting these vulnerabilities could allow an attacker, in some cases even without authentication, to take control of the targeted building automation system. Once compromised, the attacker could proceed to disable security systems and alarms, leading to potentially severe consequences. This highlights the critical nature of addressing these vulnerabilities promptly.

Complexity of exploitation

While some of the vulnerabilities can be exploited relatively easily, others require more sophisticated techniques. Certain vulnerabilities can only be exploited through a man-in-the-middle (MitM) attack on the network or local access to the affected Loytec products. These additional requirements for exploitation serve as obstacles, but they still emphasize the importance of securing systems and preventing unauthorized access.

MitM attack and sensitive data access

Vulnerabilities such as CVE-2023-46380, CVE-2023-46382, CVE-2023-46383, and CVE-2023-46385 specifically require a MitM position on the network to successfully read sensitive data, such as cleartext passwords. These vulnerabilities emphasize the importance of implementing strong encryption protocols and securing network communications within building automation systems.

Easy access through exposed web user interface

One of the vulnerabilities, CVE-2023-46382, poses a significant risk due to its exploitable nature. This vulnerability does not require any technical skills to exploit. If the web user interface of the preinstalled version of LWEB-802 is exposed to the internet, anyone with access can easily enter and assume control. This emphasizes the importance of proper network configuration and applying appropriate access controls.

Access to sensitive files as an administrator

For CVE-2023-46387 and CVE-2023-46389, the ability to access sensitive files containing SMTP client credentials used for alert and report functions requires an attacker to gain administrator-level access. However, once an attacker successfully achieves administrative privileges, these files can be easily accessed, leading to potential misuse or unauthorized disclosure of sensitive information.

Reporting and vendor response

TXOne Networks initially reported these vulnerabilities to Loytec through Trend Micro’s Zero Day Initiative (ZDI) in October 2021. Shockingly, the US cybersecurity agency, CISA, attempted to contact Loytec a year later, highlighting potential delays in the vendor’s response to critical security concerns. It is imperative that vendors promptly address reported vulnerabilities to safeguard their customers’ systems.

The unpatched vulnerabilities discovered in Loytec building automation products by TXOne Networks represent a significant threat to industrial cybersecurity. Urgent action is needed to identify and mitigate these vulnerabilities, ensuring the security and integrity of building automation systems. Vendors must respond swiftly to vulnerability reports and patch their products, while end-users and system administrators should promptly apply patches and implement robust security measures to safeguard their critical infrastructure from potential compromise and unauthorized access. By prioritizing cybersecurity and fostering collaboration between cybersecurity researchers and manufacturers, we can collectively enhance the resilience of our critical infrastructures, guarding against potential cyber threats that could have severe consequences.

Explore more

Trend Analysis: AI in Real Estate

Navigating the real estate market has long been synonymous with staggering costs, opaque processes, and a reliance on commission-based intermediaries that can consume a significant portion of a property’s value. This traditional framework is now facing a profound disruption from artificial intelligence, a technological force empowering consumers with unprecedented levels of control, transparency, and financial savings. As the industry stands

Insurtech Digital Platforms – Review

The silent drain on an insurer’s profitability often goes unnoticed, buried within the complex and aging architecture of legacy systems that impede growth and alienate a digitally native customer base. Insurtech digital platforms represent a significant advancement in the insurance sector, offering a clear path away from these outdated constraints. This review will explore the evolution of this technology from

Trend Analysis: Insurance Operational Control

The relentless pursuit of market share that has defined the insurance landscape for years has finally met its reckoning, forcing the industry to confront a new reality where operational discipline is the true measure of strength. After a prolonged period of chasing aggressive, unrestrained growth, 2025 has marked a fundamental pivot. The market is now shifting away from a “growth-at-all-costs”

AI Grading Tools Offer Both Promise and Peril

The familiar scrawl of a teacher’s red pen, once the definitive symbol of academic feedback, is steadily being replaced by the silent, instantaneous judgment of an algorithm. From the red-inked margins of yesteryear to the instant feedback of today, the landscape of academic assessment is undergoing a seismic shift. As educators grapple with growing class sizes and the demand for

Legacy Digital Twin vs. Industry 4.0 Digital Twin: A Comparative Analysis

The promise of a perfect digital replica—a tool that could mirror every gear turn and temperature fluctuation of a physical asset—is no longer a distant vision but a bifurcated reality with two distinct evolutionary paths. On one side stands the legacy digital twin, a powerful but often isolated marvel of engineering simulation. On the other is its successor, the Industry