Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. The devices allow unencrypted Web connections by default, and devices can receive configuration and firmware updates by unsecure FTP.
References
Link | Resource |
---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-18-200-03 | Third Party Advisory US Government Resource |
https://ics-cert.us-cert.gov/advisories/ICSA-18-200-03 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 04:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://ics-cert.us-cert.gov/advisories/ICSA-18-200-03 - Third Party Advisory, US Government Resource |
Information
Published : 2018-07-24 17:29
Updated : 2024-11-21 04:14
NVD link : CVE-2018-8855
Mitre link : CVE-2018-8855
CVE.ORG link : CVE-2018-8855
JSON object : View
Products Affected
echelon
- smartserver_2
- i.lon_100_firmware
- i.lon_600_firmware
- i.lon_600
- smartserver_2_firmware
- smartserver_1_firmware
- i.lon_100
- smartserver_1
CWE
CWE-319
Cleartext Transmission of Sensitive Information