CVE-2026-1633

Synectix · LAN 232 TRIO

The Synectix LAN 232 TRIO serial to ethernet adapter exposes its web management interface without authentication, allowing unauthenticated users to modify settings or factory reset the device.

Executive summary

Synectix LAN 232 TRIO adapters possess a critical security flaw where the web management interface is completely unprotected, allowing unauthenticated remote attackers to disrupt serial communications.

Vulnerability

The device exposes its web-based configuration dashboard without requiring any credentials. This allows an unauthenticated attacker to change critical device settings, network configurations, or trigger a factory reset.

Business impact

With a CVSS score of 10.0, the impact is catastrophic for industrial or commercial environments relying on serial-to-ethernet connectivity. An attacker can disconnect critical serial hardware, redirect data streams, or render the adapter inoperable. This leads to immediate operational downtime and potential loss of control over connected legacy equipment.

Remediation

Immediate Action: Update the device firmware to the latest version and immediately restrict network access to the management interface.

Proactive Monitoring: Audit network traffic for any unauthorized HTTP/HTTPS requests directed at the adapter’s IP address.

Compensating Controls: Place the serial adapters on a dedicated, isolated management VLAN and use a firewall to permit access only from trusted administrative IPs.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The Synectix LAN 232 TRIO must be secured immediately through network isolation and firmware updates. Because these devices often sit at the junction of IT and OT networks, the risk of lateral movement or process disruption is extremely high.