Vulnerabilities (CVE)

Filtered by vendor Redlion Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-5719 1 Redlion 3 Crimson, Da50a, Da70a 2023-11-14 N/A 9.8 CRITICAL
The Crimson 3.2 Windows-based configuration tool allows users with administrative access to define new passwords for users and to download the resulting security configuration to a device. If such a password contains the percent (%) character, invalid values will be included, potentially truncating the string if a NUL is encountered. If the simplified password is not detected by the administrator, the device might be left in a vulnerable state as a result of more-easily compromised credentials. Note that passwords entered via the Crimson system web server do not suffer from this vulnerability.
CVE-2022-1039 1 Redlion 2 Da50n, Da50n Firmware 2022-05-04 10.0 HIGH 9.8 CRITICAL
The weak password on the web user interface can be exploited via HTTP or HTTPS. Once such access has been obtained, the other passwords can be changed. The weak password on Linux accounts can be accessed via SSH or Telnet, the former of which is by default enabled on trusted interfaces. While the SSH service does not support root login, a user logging in using either of the other Linux accounts may elevate to root access using the su command if they have access to the associated password.
CVE-2020-27285 1 Redlion 1 Crimson 2021-01-08 6.4 MEDIUM 9.1 CRITICAL
The default configuration of Crimson 3.1 (Build versions prior to 3119.001) allows a user to be able to read and modify the database without authentication.
CVE-2020-16210 1 Redlion 4 N-tron 702-w, N-tron 702-w Firmware, N-tron 702m12-w and 1 more 2020-09-04 3.5 LOW 9.0 CRITICAL
The affected product is vulnerable to reflected cross-site scripting, which may allow an attacker to remotely execute arbitrary code and perform actions in the context of an attacked user on the N-Tron 702-W / 702M12-W (all versions).
CVE-2020-16206 1 Redlion 4 N-tron 702-w, N-tron 702-w Firmware, N-tron 702m12-w and 1 more 2020-09-04 3.5 LOW 9.0 CRITICAL
The affected product is vulnerable to stored cross-site scripting, which may allow an attacker to remotely execute arbitrary code to gain access to sensitive data on the N-Tron 702-W / 702M12-W (all versions).
CVE-2020-16204 1 Redlion 4 N-tron 702-w, N-tron 702-w Firmware, N-tron 702m12-w and 1 more 2020-09-04 10.0 HIGH 9.8 CRITICAL
The affected product is vulnerable due to an undocumented interface found on the device, which may allow an attacker to execute commands as root on the device on the N-Tron 702-W / 702M12-W (all versions).
CVE-2016-9335 1 Redlion 4 Sixnet-managed Industrial Switches, Sixnet-managed Industrial Switches Firmware, Stride-managed Ethernet Switches and 1 more 2019-10-09 10.0 HIGH 10.0 CRITICAL
A hard-coded cryptographic key vulnerability was identified in Red Lion Controls Sixnet-Managed Industrial Switches running firmware Version 5.0.196 and Stride-Managed Ethernet Switches running firmware Version 5.0.190. Vulnerable versions of Stride-Managed Ethernet switches and Sixnet-Managed Industrial switches use hard-coded HTTP SSL/SSH keys for secure communication. Because these keys cannot be regenerated by users, all products use the same key. The attacker could disrupt communication or compromise the system. CVSS v3 base score: 10, CVSS vector string: (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). Red Lion Controls recommends updating to SLX firmware Version 5.3.174.