Skip to content
  Saturday 11 April 2026
Trending
November 18, 2024Massive Security Threat: 4 Million WordPress Sites at Risk! July 21, 2025<h3>Reimagining Identity for AI and Non-Human Entities</h3> March 12, 2024Establishing a Cyber Civil Defense System for Healthcare Emergency Response January 1, 2022Android Secret Codes and Hacks 2022 – Unlock Hidden Features December 26, 2023First Space Cybersecurity Best Practices Guide Unveiled by NASA November 15, 2024Cybersecurity Engineer (Clearance Required) March 17, 2025Apache Tomcat Vulnerability Exploited in Just 30 Hours! November 16, 2024The benefits of regular exercise cannot be overstated. Engaging in physical activity on a consistent basis has been shown to improve overall health and well-being. Regular exercise can help prevent chronic diseases such as heart disease, diabetes, and obesity. It also boosts mood and mental health, reduces stress and anxiety, and improves sleep quality.<br /> <br /> Exercise is not only good for the body, but also for the mind. Physical activity has been linked to improved cognitive function, increased focus and concentration, and a reduced risk of cognitive decline as we age. It can also help alleviate symptoms of depression and anxiety, and improve overall mental well-being.<br /> <br /> In addition to the physical and mental benefits, regular exercise can also improve our quality of life. It can increase energy levels, boost self-esteem and confidence, and enhance our ability to perform daily tasks. Exercise can also help us maintain a healthy weight, improve our posture and flexibility, and reduce the risk of falls and injuries.<br /> <br /> It is important to find a form of exercise that you enjoy and can stick with in the long term. Whether it’s running, swimming, cycling, yoga, or weightlifting, finding an activity that you love will make it easier to incorporate regular exercise into your routine. Remember, even small amounts of physical activity can make a big difference in your health and well-being.<br /> <br /> In conclusion, regular exercise is essential for maintaining a healthy body and mind. It offers a wide range of physical and mental benefits, from preventing chronic diseases to improving mood and cognitive function. By finding an activity that you enjoy and can commit to, you can reap the many rewards that regular exercise has to offer. So lace up those sneakers, grab your yoga mat, or hit the gym – your body and mind will thank you for it. September 9, 2025Cybersecurity Sr Software Engineer January 24, 2025Cybersecurity Engineer
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Threat Advisories  ​Ovarro TBox RTUs | CISA
Threat Advisories

​Ovarro TBox RTUs | CISA

Mister CybersecurityMister Cybersecurity—June 29, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail


1. EXECUTIVE SUMMARY

  • ​CVSS v3 7.2
  • ​ATTENTION: Exploitable remotely/low attack complexity
  • ​Vendor: Ovarro
  • ​Equipment: TBox RTUs
  • ​Vulnerabilities: Missing Authorization, Use of Broken or Risky Cryptographic Algorithm, Inclusion of Functionality from Untrusted Control Sphere, Insufficient Entropy, Improper Authorization, Plaintext Storage of a Password

2. RISK EVALUATION

​Successful exploitation of these vulnerabilities could result in sensitive system information being exposed and privilege escalation.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

​The following firmware versions of TBox RTUs are affected: 

  • ​TBox MS-CPU32: Version 1.50.598 and prior (CVE-2023-36607, CVE-2023-36609, CVE-2023-36610, CVE-2023-36611)
  • ​TBox MS-CPU32-S2: Version 1.50.598 and prior (CVE-2023-36607, CVE-2023-36609, CVE-2023-36610, CVE-2023-36611)
  • ​TBox LT2: Version 1.50.598 and prior (CVE-2023-36607, CVE-2023-36609, CVE-2023-36610, CVE-2023-36611)
  • ​TBox TG2: Version 1.50.598 and prior (CVE-2023-36607, CVE-2023-36609, CVE-2023-36610, CVE-2023-36611)
  • ​TBox RM2: Version 1.50.598 and prior (CVE-2023-36607, CVE-2023-36609, CVE-2023-36610, CVE-2023-36611)
  • ​TBox MS-CPU32: Version 1.46 through 1.50.598 (CVE-2023-36608)
  • ​TBox MS-CPU32-S2: Version 1.46 through 1.50.598 (CVE-2023-36608)
  • ​TBox LT2: Version 1.46 through 1.50.598 (CVE-2023-36608)
  • ​TBox TG2: Version 1.46 through 1.50.598 (CVE-2023-36608)
  • ​TBox RM2: Version 1.46 through 1.50.598 (CVE-2023-36608)
  • ​TBox MS-CPU32: All versions (CVE-2023-3395)
  • ​TBox MS-CPU32-S2: All versions (CVE-2023-3395)
  • ​TBox LT2: All versions (CVE-2023-3395)
  • ​TBox TG2: All versions (CVE-2023-3395)
  • ​TBox RM2: All versions (CVE-2023-3395)

3.2 VULNERABILITY OVERVIEW

3.2.1 ​MISSING AUTHORIZATION CWE-862

​The affected TBox RTUs are missing authorization for running some API commands. An attacker running these commands could reveal sensitive information such as software versions and web server file contents.

​CVE-2023-36607 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).

3.2.2 USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327

​The affected TBox RTUs store hashed passwords using MD5 encryption, which is an insecure encryption algorithm.

​CVE-2023-36608 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).

3.2.3 ​INCLUSION OF FUNCTIONALITY FROM UNTRUSTED CONTROL SPHERE CWE-829

​The affected TBox RTUs run OpenVPN with root privileges and can run user defined configuration scripts. An attacker could set up a local OpenVPN server and push a malicious script onto the TBox host to acquire root privileges.

​CVE-2023-36609 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).

3.2.4 INSUFFICIENT ENTROPY CWE-331

​The affected TBox RTUs generate software security tokens using insufficient entropy. The random seed used to generate the software tokens is not initialized correctly, and other parts of the token are generated using predictable time-based values. An attacker with this knowledge could successfully brute force the token and authenticate themselves.

​CVE-2023-36610 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).

3.2.5 ​IMPROPER AUTHORIZATION CWE-285

More stories

Measuresoft ScadaPro | CISA

April 16, 2024

Rockwell Automation 1783-NATR | CISA

October 21, 2025

AVEVA PI Server | CISA

January 18, 2024

Microsoft Releases Guidance on Exploitation of SharePoint Vulnerability (CVE-2025-53770)

July 20, 2025

​The affected TBox RTUs allow low privilege users to access software security tokens of higher privilege. This could allow an attacker with “user” privileges to access files requiring higher privileges by establishing an SSH session and providing the other tokens.

​CVE-2023-36611 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).

3.2.6 ​PLAINTEXT STORAGE OF A PASSWORD CWE-256

​All versions of the TWinSoft Configuration Tool store encrypted passwords as plaintext in memory. An attacker with access to system files could open a file to load the document into memory, including sensitive information associated with document, such as password. The attacker could then obtain the plaintext password by using a memory viewer.

​CVE-2023-3395 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).

3.3 BACKGROUND

  • ​CRITICAL INFRASTRUCTURE SECTORS: Water and Wastewater, Energy, Transportation, Communications
  • ​COUNTRIES/AREAS DEPLOYED: Worldwide
  • ​COMPANY HEADQUARTERS LOCATION: England

3.4 RESEARCHER

​Floris Hendriks and Jeroen Wijenbergh of Radboud University reported these vulnerabilities to CISA.

4. MITIGATIONS

​Ovarro recommends users update the affected products to the latest version by downloading the newest software version from the Ovarro website in the “Customer Support” section.

​In addition to applying patches, Ovarro has identified the following workarounds:

​CVE-2023-36607: Disable SSH access through the integrated firewall and disable the user account SSH access by emptying its password in the application.

​CVE-2023-36608: Update to TWinSoft version 12.7.2 or later, which includes firmware version 1.50.598.

​CVE-2023-36609: Update to TWinSoft version 12.7.2 or later, which includes firmware version 1.50.598.

​CVE-2023-36610: Disable SSH access through the integrated firewall and disable the user account SSH access by emptying its password in the application. Setting a password on the application will also cause the retrieved application to be encrypted.

​CVE-2023-36611: Disable SSH access through the integrated firewall and disable the user account SSH access by emptying its password in the application. Setting a password on the application will also cause the retrieved application to be encrypted.

​CVE-2023-3395: Use password protected files within the TBox software. This will prevent attackers from opening files to load passwords into memory in plaintext.

​CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability these vulnerabilities. Specifically, users should:

  • ​Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet.
  • ​Locate control system networks and remote devices behind firewalls and isolate them from business networks.
  • ​When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.

​CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

​CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

​Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

​Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

​No known public exploits specifically target these vulnerabilities.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

2023 CWE Top 25 Most Dangerous Software Weaknesses
CISA Adds Eight Known Exploited Vulnerabilities to Catalog
Related posts
  • Related posts
  • More from author
Threat Advisories

Contemporary Controls BASC 20T | CISA

April 9, 20260
Threat Advisories

GPL Odorizers GPL750 | CISA

April 9, 20260
Threat Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

April 8, 20260
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Resilience Specialist – Governance Risk and Compliance

April 11, 20260
Careers

Principal Cybersecurity – Cloud Security Strategy

April 11, 20260
Careers

Cybersecurity Engineer

April 11, 20260
Careers

Cybersecurity Engineer Principal

April 11, 20260
Careers

Cybersecurity Analyst III, Patch Management

April 11, 20260
Careers

Cybersecurity Engineering Support

April 11, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Resilience Specialist – Governance Risk and Compliance
  • Principal Cybersecurity – Cloud Security Strategy
  • Cybersecurity Engineer
  • Cybersecurity Engineer Principal
  • Cybersecurity Analyst III, Patch Management

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures