CVE-2026-20761
Awaiting Analysis Awaiting Analysis - Queue
Remote Command Execution via IP-852 in EnOcean SmartServer IoT

Publication date: 2026-02-20

Last updated on: 2026-02-20

Assigner: ICS-CERT

Description
A vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and prior, which would allow remote attackers, in the LON IP-852 management messages, to send specially crafted IP-852 messages resulting in arbitrary OS command execution on the device.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-20
Last Modified
2026-02-20
Generated
2026-05-07
AI Q&A
2026-02-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
enocean smartserver_iot From 3.5 (inc)
enocean smartserver_iot to 4.60.009 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and earlier. It allows remote attackers to send specially crafted LON IP-852 management messages that can execute arbitrary operating system commands on the affected device.


How can this vulnerability impact me? :

The vulnerability can lead to a complete compromise of the affected device by allowing remote attackers to execute arbitrary OS commands. This can result in unauthorized control over the device, potentially leading to data breaches, disruption of IoT operations, and further network compromise.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability in EnOcean SmartServer IoT versions 4.60.009 and prior, it is recommended to enable the enhanced security features available from version 3.5 onward.

  • Deploy the SmartServer IoT within a private network, DMZ, or VPN to limit exposure.
  • Use certificates to secure communication between clients and the SmartServer, preferably signed certificates validated by an external certificate authority.
  • Enable the enhanced firewall mode to restrict outgoing and routed ports, ensuring only necessary ports are open.
  • Enforce strong password policies requiring a minimum of 14 characters with digits, lowercase, uppercase, and special characters.
  • Disable root access over SSH by enabling the SCP control in enhanced security settings.

These settings can be configured via the System Configuration page in the SmartServer IoT Configuration interface, the SmartServer Secure Utility, or the CMS Settings widget for SmartConnect.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart