CVE-2018-10627

Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. An attacker can use the SOAP API to retrieve and change sensitive configuration items such as the usernames and passwords for the Web and FTP servers. This vulnerability does not affect the i.LON 600 product.
References
Link Resource
https://ics-cert.us-cert.gov/advisories/ICSA-18-200-03 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:echelon:smartserver_1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:echelon:smartserver_1:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:echelon:smartserver_2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:echelon:smartserver_2:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:echelon:i.lon_100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:echelon:i.lon_100:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-07-24 17:29

Updated : 2024-02-04 20:03


NVD link : CVE-2018-10627

Mitre link : CVE-2018-10627

CVE.ORG link : CVE-2018-10627


JSON object : View

Products Affected

echelon

  • smartserver_2_firmware
  • smartserver_1
  • i.lon_100_firmware
  • smartserver_1_firmware
  • i.lon_100
  • smartserver_2
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor