Researchers from Claroty's Team 82 have uncovered two vulnerabilities of the highest possible severity in Red Lion Sixnet series industrial remote terminal units (RTUs). These devices are commonly deployed in sensitive Industrial Control Systems (ICS) across critical infrastructure sectors. The two vulnerabilities, CVE-2023-42770 and CVE-2023-40151, are each rated with a CVSS score of 10.0 (Critical). When chained together, they allow a remote, unauthenticated attacker to bypass authentication and achieve remote code execution (RCE) with root privileges. A successful exploit could allow an adversary to manipulate or disrupt physical processes, leading to potential equipment damage or shutdown of essential services. Red Lion released patches in June 2025, and asset owners are urged to apply them immediately.
The attack relies on chaining two separate flaws that, when combined, result in a full, unauthenticated device takeover.
CVE-2023-42770 - Authentication Bypass (CVSS 10.0):
The RTU's software listens for communications on port 1594 using both TCP and UDP protocols. The software correctly enforces an authentication challenge for messages received over UDP. However, it fails to perform the same check for messages received over TCP. An attacker can simply send their commands over TCP to port 1594 to completely bypass the authentication mechanism.
CVE-2023-40151 - Remote Code Execution (CVSS 10.0): The Sixnet Universal Driver (UDR) contains a built-in function that allows for the execution of Linux shell commands. This function is intended for legitimate administrative purposes but lacks proper authorization checks.
Exploit Chain: An unauthenticated attacker on the same network as the RTU can:
reboot, or a command to download and run malware).1594.These devices are used globally in sectors including:
The impact of exploiting these vulnerabilities is extremely severe, especially in an OT environment.
reboot command could create a denial-of-service condition, disrupting operations.Given that these devices control physical processes, a successful cyberattack could have real-world kinetic effects.
Detecting exploitation requires network-level monitoring within the OT environment.
1594. According to the researchers, legitimate communication on this port should only occur over UDP. Any TCP traffic to this port is highly suspicious and likely an exploitation attempt. This is a direct application of D3FEND Network Traffic Analysis (D3-NTA).1594 for any unexpected or unauthorized commands being sent to the RTUs.Red Lion released patches in June 2025 and asset owners must take immediate action.
1594 on all vulnerable Red Lion RTUs. Allow only UDP traffic to this port from authorized management systems.Applying the firmware patches from Red Lion is the most effective way to remediate the vulnerabilities.
Mapped D3FEND Techniques:
Isolating the ICS network from corporate (IT) networks and the internet prevents remote attackers from reaching the vulnerable devices.
Creating firewall rules to block TCP traffic to port 1594 serves as a critical compensating control if patching is not immediately feasible.
While not directly applicable to this specific flaw, general hardening of ICS devices to prevent arbitrary code execution is a key principle of OT security.
The primary and most urgent countermeasure is to apply the firmware patches released by Red Lion in June 2025. Given the CVSS 10.0 severity and the potential for physical disruption, patching these RTUs should be the top priority for any asset owner. A coordinated and planned shutdown may be required in some environments, but the risk of leaving these devices unpatched is unacceptable. Before deploying the patch, asset owners should validate it in a test environment to ensure it does not negatively impact their specific process. After patching, verify that the firmware version has been successfully updated on all devices. This action directly remediates both CVE-2023-42770 and CVE-2023-40151.
As an immediate compensating control, especially if patching cannot be done instantly, implement strict firewall rules to filter traffic to the vulnerable Red Lion RTUs. Create a rule that explicitly blocks all inbound traffic to TCP port 1594 for the affected devices. Since legitimate communication uses UDP on this port, blocking TCP will not impact normal operations but will completely block the authentication bypass vector (CVE-2023-42770). This is a highly effective and low-impact way to mitigate the risk while planning for the firmware update. This rule should be implemented on the firewall or switch segmenting the OT network zone where the RTUs reside.
Beyond immediate remediation, this incident highlights the critical importance of proper network architecture for OT security. All Red Lion RTUs and other critical ICS/OT devices must be isolated on a dedicated network segment, completely separated from the corporate IT network and the internet. Use a DMZ architecture (based on the Purdue Model) to mediate any required communication between IT and OT. This ensures that even if an attacker compromises the IT network, they do not have a direct path to reach and exploit critical controllers like the Red Lion RTUs. Proper network isolation is a foundational control that would have prevented a remote attacker from ever reaching the vulnerable TCP port 1594 in the first place.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats