Impact
The Synectix LAN 232 TRIO 3‑Port serial to Ethernet adapter lacks authentication for its web management interface, allowing any user with network access to alter critical device settings or perform factory resets. This unfettered access can lead to unauthorized configuration changes, service disruption, and loss of device integrity. The vulnerability corresponds to CWE‑306, highlighting a missing authentication weakness.
Affected Systems
The affected product is Synectix LAN 232 TRIO. No specific firmware versions are listed, and the manufacturer is no longer in business. The product is effectively end‑of‑life and no firmware updates will be released. The official CNA workaround indicates the device is end‑of‑life and no firmware fixes will be available.
Risk and Exploitability
The CVSS base score of 10 indicates a critical impact if exploited. EPSS is reported as less than 1 %, suggesting a low current exploit probability, but the absence of vendor remediation means the risk remains high. The device is not listed in CISA’s Known Exploited Vulnerabilities catalog, yet the lack of authentication makes it a prime candidate for attackers who can reach the device’s management interface over the network. Because Synectix is no longer in business and no firmware updates are available, the risk persists without a vendor patch, making replacement the only viable long‑term solution.
OpenCVE Enrichment