Synectix LAN 232 TRIO

View CSAF

Summary

Successful exploitation of this vulnerability could result in an unauthenticated attacker modifying critical device settings or factory resetting the device.

The following versions of Synectix LAN 232 TRIO are affected:

  • LAN 232 TRIO vers:all/* (CVE-2026-1633)
CVSS Vendor Equipment Vulnerabilities
v3 10 Synectix Synectix LAN 232 TRIO Missing Authentication for Critical Function

Background

  • Critical Infrastructure Sectors: Critical Manufacturing, Emergency Services, Energy, Information Technology, Transportation Systems, Water and Wastewater
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: United States

Vulnerabilities

Expand All +

CVE-2026-1633

The Synectix LAN 232 TRIO 3-Port serial to ethernet adapter exposes its web management interface without requiring authentication, allowing unauthenticated users to modify critical device settings or factory reset the device.

View CVE Details


Affected Products

Synectix LAN 232 TRIO
Vendor:
Synectix
Product Version:
Synectix LAN 232 TRIO: vers:all/*
Product Status:
known_affected
Remediations

Mitigation
The affected products should be considered end-of-life, as Synectix is no longer in business and therefore firmware fixes, mitigations and updates will be unavailable.

Relevant CWE: C

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from All CISA Advisories

Read the original article: