Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. The devices store passwords in plaintext, which may allow an attacker with access to the configuration file to log into the SmartServer web user interface.
References
Link | Resource |
---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-18-200-03 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
No history.
Information
Published : 2018-07-24 17:29
Updated : 2019-10-09 23:42
NVD link : CVE-2018-8851
Mitre link : CVE-2018-8851
JSON object : View
Products Affected
echelon
- i.lon_600_firmware
- i.lon_100_firmware
- i.lon_600
- smartserver_1
- smartserver_1_firmware
- smartserver_2_firmware
- i.lon_100
- smartserver_2
CWE
CWE-522
Insufficiently Protected Credentials