Red Lion Controls Crimson
Red Lion Controls Crimson versions 3.0 and earlier contain multiple memory safety vulnerabilities (CWE-416 use-after-free, CWE-119 buffer overflow, CWE-824 access of uninitialized pointer, CWE-321 hardcoded cryptographic key). These allow local code execution with high impact on confidentiality, integrity, and availability. The hardcoded key vulnerability (CVE-2019-10990) specifically affects the database protection mechanism, which is not designed as a cryptographically secure method of protection. Exploitation requires local access and user interaction (opening an unsolicited file).
- Local access to the workstation running Crimson
- Ability to get an authorized user to open a crafted file or attachment
- OR read access to encrypted Crimson database files on disk
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8100702f-e77c-4ac7-80f6-c6c4983b8546Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.