Advisory

Critical authentication flaw reported in Lantronix Xport

Take action: If you are using Lantronix Xport devices, be aware that they are critically vulnerable and won't be patched. As usual, make sure they are isolated from the internet and accessible only from trusted networks. Then make a full risk assessment and consider replacing them with supported and secured devices.


Learn More

A severe security vulnerability has reported  in Lantronix Xport devices that are widely deployed across critical infrastructure sectors worldwide. 

The vulnerability is tracked as CVE-2025-2567 (CVSS score 9.8) and allows remote attackers to gain unauthorized access to the configuration interface without authentication. Successful exploitation could enable attackers to modify or disable critical settings, disrupt fuel monitoring and supply chain operations, pivot to other connected systems on the network and create safety hazards in fuel storage and transportation.

It affects Lantronix Xport versions 6.5.0.7 through 7.0.0.3

Since Lantronix has not released a patch for this vulnerability, they are recommending users upgrade to their Xport Edge product, which includes enhanced security features and is not affected by this vulnerability. 

Additionally, CISA recommends implementing the following defensive measures:

  1. Minimize network exposure for all control system devices, ensuring they are not accessible from the internet
  2. Place control system networks and remote devices behind firewalls and isolate them from business networks
  3. When remote access is required, use secure methods such as Virtual Private Networks (VPNs), keeping them updated to the most current version
Critical authentication flaw reported in Lantronix Xport