Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. An attacker can use the SOAP API to retrieve and change sensitive configuration items such as the usernames and passwords for the Web and FTP servers. This vulnerability does not affect the i.LON 600 product.
                
            References
                    | Link | Resource | 
|---|---|
| https://ics-cert.us-cert.gov/advisories/ICSA-18-200-03 | Third Party Advisory US Government Resource | 
Configurations
                    Configuration 1 (hide)
| AND | 
                                
                                
 
  | 
                        
Configuration 2 (hide)
| AND | 
                                
                                
 
  | 
                        
Configuration 3 (hide)
| AND | 
                                
                                
 
  | 
                        
Information
                Published : 2018-07-24 10:29
Updated : 2019-10-09 16:32
NVD link : CVE-2018-10627
Mitre link : CVE-2018-10627
JSON object : View
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
                echelon
- i.lon_100_firmware
 - smartserver_2
 - smartserver_2_firmware
 - i.lon_100
 - smartserver_1_firmware
 - smartserver_1
 


