CVE-2018-10627
Summary
| CVE | CVE-2018-10627 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-07-24 17:29:00 UTC |
| Updated | 2019-10-09 23:32:00 UTC |
| Description | Echelon SmartServer 1 all versions, SmartServer 2 all versions prior to release 4.11.007, i.LON 100 all versions, and i.LON 600 all versions. An attacker can use the SOAP API to retrieve and change sensitive configuration items such as the usernames and passwords for the Web and FTP servers. This vulnerability does not affect the i.LON 600 product. |
Risk And Classification
Problem Types: CWE-200
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Echelon | I.lon 100 | - | All | All | All |
| Hardware | Echelon | I.lon 100 | - | All | All | All |
| Operating System | Echelon | I.lon 100 Firmware | All | All | All | All |
| Operating System | Echelon | I.lon 100 Firmware | All | All | All | All |
| Hardware | Echelon | Smartserver 1 | - | All | All | All |
| Hardware | Echelon | Smartserver 1 | - | All | All | All |
| Operating System | Echelon | Smartserver 1 Firmware | All | All | All | All |
| Operating System | Echelon | Smartserver 1 Firmware | All | All | All | All |
| Hardware | Echelon | Smartserver 2 | - | All | All | All |
| Hardware | Echelon | Smartserver 2 | - | All | All | All |
| Operating System | Echelon | Smartserver 2 Firmware | All | All | All | All |
| Operating System | Echelon | Smartserver 2 Firmware | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Echelon SmartServer 1, SmartServer 2, SmartServer 3, i.LON 100, i.LON 600 (Update A) | CISA | MISC | ics-cert.us-cert.gov | Third Party Advisory, US Government Resource |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.