Sploit.io - Search

Product: R-SeeNet, version: <= 2.4.22

CVE-2023-2611

Severity: CRITICAL

Description: Advantech R-SeeNet versions 2.4.22 is installed with a hidden root-level user that is not available in the users list. This hidden user has a password that cannot be changed by users.

CVSS Score: 9.8

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.001090000
  • Percentile: 0.289200000
  • Date: 2026-04-27

ExploitDB

No data available.

HackerOne Data

  • Rank: 9192
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Advantech R-SeeNet - Versions: 0

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability CVE-2023-2611 pertains to a hidden root-level user within Advantech R-SeeNet versions 2.4.22, with a password that cannot be changed by regular users. This represents a significant risk due to the high level of privilege granted to the attacker. The nature of the vulnerability is a hard-coded credential, a common but often impactful security flaw. The business impact could be substantial, especially if R-SeeNet is used for critical monitoring or control systems. The likelihood of exploitation is high, as the vulnerability is network accessible and requires no user interaction, making it easily exploitable. The CVSS score of 9.8 (Critical) reflects this. The potential impact on confidentiality is high, as the attacker with root access can access sensitive data. Integrity is also high, as the attacker can modify system configurations or data. Availability is also high, as the attacker could potentially disrupt the functionality of R-SeeNet. The EPSS score of 0.001090000 indicates a relatively low but still present probability of exploitation given the large attack surface.

    2. Potential Attack Scenarios
    An attacker could leverage this vulnerability to gain complete control of the R-SeeNet system. The attack vector would be network-based, meaning the attacker doesn't need physical access or user interaction. The attack process would involve identifying the hidden user and utilizing the known, unchangeable password to log in with root privileges. Once logged in, the attacker could perform various actions, such as extracting configuration data, modifying system settings, or even using the R-SeeNet system as a stepping stone to compromise other systems on the network. A specific scenario might involve a remote attacker discovering the R-SeeNet instance on the network, using the hardcoded credentials to gain root access, and then installing malware or exfiltrating sensitive video footage monitored by the system. The potential outcome is full compromise of the R-SeeNet system and potentially wider network compromise depending on the system’s role and network connectivity.

    3. Mitigation Recommendations
    The primary mitigation recommendation is to upgrade to R-SeeNet version 2.4.23, which addresses the hard-coded credential issue. This is the most effective and long-term solution. Immediate action should be taken to schedule the upgrade as soon as possible, prioritizing systems critical to operations. Until the upgrade can be implemented, consider network segmentation to limit the blast radius if the system is compromised. Monitor network traffic for unusual activity originating from the R-SeeNet system. Review the system logs for any suspicious login attempts, though the hidden user may not be readily apparent in standard logs. Relevant resources include the CISA advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-173-02 and the Advantech product page for R-SeeNet: https://icr.advantech.cz/products/software/r-seenet.

    4. Executive Summary
    Advantech R-SeeNet software, specifically version 2.4.22, contains a critical vulnerability stemming from a hidden root-level user with a fixed password. This allows an attacker to gain full control of the system with relative ease, potentially compromising sensitive data and disrupting operations. The risk is high due to the network accessibility and the high privileges granted to the attacker. To address this, we recommend upgrading to version 2.4.23 as soon as possible. This vulnerability poses a significant risk to our operations, and prompt action is crucial to minimize the potential business impact. Ignoring this issue could lead to data breaches, system outages, or even wider network compromise. Prioritize patching to protect our critical R-SeeNet deployments.

    CVE-2023-3256

    Severity: HIGH

    Description: Advantech R-SeeNet versions 2.4.22 allows low-level users to access and load the content of local files.

    CVSS Score: 8.8

    Priority

    B

    CISA Data

    EPSS Data

    • EPSS: 0.000880000
    • Percentile: 0.251020000
    • Date: 2026-04-18

    ExploitDB

    No data available.

    HackerOne Data

    • Rank: 9115
    • Reports submitted count: 0
    • Unknown: 0
    • None: 0
    • Low: 0
    • Medium: 0
    • High: 0
    • Critical: 0

    GitHub PoCs

      Nuclei Templates

      No data available.

      VulnCheck Data

      Affected Products:

      • Advantech R-SeeNet - Versions: 0

      References:

      Risk Assessment

      1. Risk Assessment
      The vulnerability CVE-2023-3256 in Advantech R-SeeNet versions 2.4.22 and earlier allows low-level users to access and load the content of local files. This is a CWE-73, External Control of File Name or Path vulnerability. The CVSS score of 8.8 (HIGH) indicates a significant risk. The vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H shows the vulnerability is network accessible, has low attack complexity, requires low privileges, has no user interaction, and impacts confidentiality, integrity, and availability all highly. The business impact could be substantial, potentially leading to data breaches, system compromise, or denial of service. The likelihood of exploitation is moderate to high, as low-level users are often numerous and the attack complexity is low. The EPSS score of 0.000880000 suggests a relatively low, but not insignificant, probability of exploitation given the number of potentially vulnerable systems.

      2. Potential Attack Scenarios
      A potential attack scenario involves a malicious low-level user exploiting the vulnerability to read sensitive configuration files. The attacker, possessing low-level privileges, could leverage the ability to load local files to read files containing database credentials, API keys, or other sensitive information. The attack vector is network-based, requiring the attacker to be on the same network as the R-SeeNet system. The attack process involves the attacker crafting a request that triggers the R-SeeNet software to load a specifically chosen local file. The potential outcome is the compromise of sensitive data, leading to potential data breaches, lateral movement within the network, and ultimately, a larger impact on business operations. Another scenario could involve writing to a file the user has access to, overwriting a critical system file, leading to a denial of service.

      3. Mitigation Recommendations
      The primary mitigation recommendation is to upgrade to R-SeeNet version 2.4.23 or later, which addresses the vulnerability. This can be accomplished by downloading the latest version from the Advantech website: https://icr.advantech.cz/products/software/r-seenet. As an immediate action, consider restricting network access to the R-SeeNet system to only trusted networks and users. Additionally, implement file access controls to limit the files that low-level users can access, reducing the potential impact of a successful exploit. Regularly monitor logs for unusual file access activity, looking for signs of exploitation.

      4. Executive Summary
      Advantech R-SeeNet, a software used in various industrial control systems, is vulnerable to a high-severity flaw (CVE-2023-3256) that allows low-level users to access and load local files. This means attackers can potentially steal sensitive data, compromise system integrity, or even cause a denial of service. The risk is significant, with a CVSS score of 8.8. The most effective mitigation is to upgrade to version 2.4.23. This upgrade should be prioritized to protect your systems and data. Delaying action could result in data breaches and disruptions to business operations. Prompt patching and network segmentation are key to minimizing the impact of this vulnerability.