CVE-2018-8851

Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. The devices store passwords in plaintext, which may allow an attacker with access to the configuration file to log into the SmartServer web user interface.
References
Link Resource
https://ics-cert.us-cert.gov/advisories/ICSA-18-200-03 Third Party Advisory US Government Resource
https://ics-cert.us-cert.gov/advisories/ICSA-18-200-03 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:echelon:smartserver_1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:echelon:smartserver_1:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:echelon:smartserver_2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:echelon:smartserver_2:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:echelon:i.lon_100_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:echelon:i.lon_100:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:echelon:i.lon_600_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:echelon:i.lon_600:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:14

Type Values Removed Values Added
References () https://ics-cert.us-cert.gov/advisories/ICSA-18-200-03 - Third Party Advisory, US Government Resource () https://ics-cert.us-cert.gov/advisories/ICSA-18-200-03 - Third Party Advisory, US Government Resource

Information

Published : 2018-07-24 17:29

Updated : 2024-11-21 04:14


NVD link : CVE-2018-8851

Mitre link : CVE-2018-8851

CVE.ORG link : CVE-2018-8851


JSON object : View

Products Affected

echelon

  • smartserver_2
  • i.lon_100_firmware
  • i.lon_600_firmware
  • i.lon_600
  • smartserver_2_firmware
  • smartserver_1_firmware
  • i.lon_100
  • smartserver_1
CWE
CWE-256

Unprotected Storage of Credentials

CWE-522

Insufficiently Protected Credentials