PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-1633 Synectix CVE debrief

CISA published an advisory for Synectix LAN 232 TRIO on 2026-02-03 describing a critical authentication failure in the device’s web management interface. An unauthenticated user who can reach the interface may modify critical settings or factory reset the device. The advisory also states the product should be treated as end-of-life because Synectix is no longer in business, so firmware fixes, mitigations, and updates are unavailable.

Vendor
Synectix
Product
LAN 232 TRIO
CVSS
CRITICAL 10
CISA KEV
Not listed in stored evidence
Original CVE published
2026-02-03
Original CVE updated
2026-02-03
Advisory published
2026-02-03
Advisory updated
2026-02-03

Who should care

ICS/OT operators, site administrators, and network engineers responsible for Synectix LAN 232 TRIO deployments should treat this as urgent, especially where the web management interface is reachable on any trusted or untrusted network.

Technical summary

The advisory describes a missing-authentication condition on the LAN 232 TRIO web management interface. CISA assigns a CVSS v3.1 vector of AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H with a score of 10.0, reflecting network accessibility, no privileges required, no user interaction, and severe impact if the interface is reached. The advisory notes the affected product is end-of-life, so vendor firmware remediation is not expected.

Defensive priority

Immediate

Recommended defensive actions

  • Identify all Synectix LAN 232 TRIO devices and confirm whether the web management interface is reachable from any network segment.
  • Restrict access to the management interface to the smallest possible administrative network and remove any unnecessary exposure.
  • Treat the device as end-of-life and plan replacement or retirement, since the advisory says Synectix is no longer in business and fixes are unavailable.
  • Review device configuration and access controls for unauthorized changes or unexpected factory resets.
  • Monitor adjacent network segments and management planes for unauthorized access attempts against the device interface.

Evidence notes

Primary evidence comes from CISA’s CSAF advisory ICSA-26-034-04 published on 2026-02-03 and the linked CISA advisory page. The advisory text states the web management interface is exposed without authentication and that unauthenticated users can modify critical settings or factory reset the device. The remediation section says the affected products should be considered end-of-life because Synectix is no longer in business, leaving no firmware fix path.

Official resources

Publicly disclosed by CISA on 2026-02-03. Not listed in CISA KEV in the supplied enrichment.