CVE-2026-20761
Remote Command Execution via IP-852 in EnOcean SmartServer IoT
Publication date: 2026-02-20
Last updated on: 2026-02-20
Assigner: ICS-CERT
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| enocean | smartserver_iot | From 3.5 (inc) |
| enocean | smartserver_iot | to 4.60.009 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and earlier. It allows remote attackers to send specially crafted LON IP-852 management messages that can execute arbitrary operating system commands on the affected device.
How can this vulnerability impact me? :
The vulnerability can lead to a complete compromise of the affected device by allowing remote attackers to execute arbitrary OS commands. This can result in unauthorized control over the device, potentially leading to data breaches, disruption of IoT operations, and further network compromise.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability in EnOcean SmartServer IoT versions 4.60.009 and prior, it is recommended to enable the enhanced security features available from version 3.5 onward.
- Deploy the SmartServer IoT within a private network, DMZ, or VPN to limit exposure.
- Use certificates to secure communication between clients and the SmartServer, preferably signed certificates validated by an external certificate authority.
- Enable the enhanced firewall mode to restrict outgoing and routed ports, ensuring only necessary ports are open.
- Enforce strong password policies requiring a minimum of 14 characters with digits, lowercase, uppercase, and special characters.
- Disable root access over SSH by enabling the SCP control in enhanced security settings.
These settings can be configured via the System Configuration page in the SmartServer IoT Configuration interface, the SmartServer Secure Utility, or the CMS Settings widget for SmartConnect.