PatchSiren cyber security CVE debrief
CVE-2026-1633 Synectix CVE debrief
CISA published an advisory for Synectix LAN 232 TRIO on 2026-02-03 describing a critical authentication failure in the device’s web management interface. An unauthenticated user who can reach the interface may modify critical settings or factory reset the device. The advisory also states the product should be treated as end-of-life because Synectix is no longer in business, so firmware fixes, mitigations, and updates are unavailable.
- Vendor
- Synectix
- Product
- LAN 232 TRIO
- CVSS
- CRITICAL 10
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-02-03
- Original CVE updated
- 2026-02-03
- Advisory published
- 2026-02-03
- Advisory updated
- 2026-02-03
Who should care
ICS/OT operators, site administrators, and network engineers responsible for Synectix LAN 232 TRIO deployments should treat this as urgent, especially where the web management interface is reachable on any trusted or untrusted network.
Technical summary
The advisory describes a missing-authentication condition on the LAN 232 TRIO web management interface. CISA assigns a CVSS v3.1 vector of AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H with a score of 10.0, reflecting network accessibility, no privileges required, no user interaction, and severe impact if the interface is reached. The advisory notes the affected product is end-of-life, so vendor firmware remediation is not expected.
Defensive priority
Immediate
Recommended defensive actions
- Identify all Synectix LAN 232 TRIO devices and confirm whether the web management interface is reachable from any network segment.
- Restrict access to the management interface to the smallest possible administrative network and remove any unnecessary exposure.
- Treat the device as end-of-life and plan replacement or retirement, since the advisory says Synectix is no longer in business and fixes are unavailable.
- Review device configuration and access controls for unauthorized changes or unexpected factory resets.
- Monitor adjacent network segments and management planes for unauthorized access attempts against the device interface.
Evidence notes
Primary evidence comes from CISA’s CSAF advisory ICSA-26-034-04 published on 2026-02-03 and the linked CISA advisory page. The advisory text states the web management interface is exposed without authentication and that unauthenticated users can modify critical settings or factory reset the device. The remediation section says the affected products should be considered end-of-life because Synectix is no longer in business, leaving no firmware fix path.
Official resources
-
CVE-2026-1633 CVE record
CVE.org
-
CVE-2026-1633 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed by CISA on 2026-02-03. Not listed in CISA KEV in the supplied enrichment.