Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
EnOcean SmartServer Security Flaws Threaten Remote Hacks

EnOcean SmartServer Security Flaws Threaten Remote Hacks

Posted on April 30, 2026 By CWS

Security vulnerabilities have been identified in the EnOcean SmartServer IoT platform, posing a risk of remote hacking to building management systems. These findings, revealed by researchers from the cybersecurity firm Claroty, highlight potential threats to the systems that manage smart buildings, industrial facilities, and data centers.

Details of the EnOcean SmartServer Platform

The EnOcean SmartServer serves as a multi-protocol gateway and edge controller, facilitating the integration of industrial devices with cloud-based management solutions. Promoted as an ideal option for smart and automated environments, it now faces scrutiny due to the newly discovered vulnerabilities.

Claroty’s research pinpointed two critical flaws: a security bypass vulnerability, labeled CVE-2026-22885, and a remote code execution flaw, tracked as CVE-2026-20761. These vulnerabilities could be harnessed by attackers to compromise internet-connected EnOcean devices, enabling unauthorized memory access and command execution.

Potential Impact of the Vulnerabilities

The exploitation of these vulnerabilities allows attackers to manipulate the argument passed to the device’s system calls, potentially leading to a complete takeover of the Linux-based device. This could result in gaining root access and executing arbitrary code, thereby compromising the entire building management system.

In practical terms, such vulnerabilities could be leveraged by malicious entities to gain control over critical automation systems in buildings, posing a significant threat to infrastructure security.

Response and Mitigation Efforts

In response to these findings, EnOcean has been alerted and has released a patch in the form of SmartServer 4.6 update 2 (4.60.023) to address the identified security issues. It’s important to note that these vulnerabilities also affect older models, specifically legacy i.LON devices.

Claroty has provided technical details along with proof-of-concept exploits to inform and assist in mitigating these risks. The disclosure underscores the importance of regular updates and vigilance in securing IoT platforms against evolving cyber threats.

For additional context, similar vulnerabilities have been noted in other systems, such as internet-facing VNC servers and serial-to-IP converters, emphasizing the pervasive nature of security challenges in industrial and healthcare settings.

In conclusion, while the release of patches by EnOcean is a positive step, ongoing vigilance and prompt application of security updates remain crucial to protect against potential exploitation.

Security Week News Tags:building automation, Claroty, CVE-2026-20761, CVE-2026-22885, cyber-physical systems, Cybersecurity, EnOcean, ICS security, IoT security, remote hacking, SmartServer

Post navigation

Previous Post: KarstoRAT Malware Threatens with Extensive Control Abilities
Next Post: Critical ConnectWise ScreenConnect Flaw Under Exploitation

Related Posts

Google DeepMind Identifies Web Threats to AI Agents Google DeepMind Identifies Web Threats to AI Agents Security Week News
Lanscope Endpoint Manager Zero-Day Exploited in the Wild Lanscope Endpoint Manager Zero-Day Exploited in the Wild Security Week News
Cisco Says User Data Stolen in CRM Hack Cisco Says User Data Stolen in CRM Hack Security Week News
Vietnamese Hackers Distribute Malware via Fake AI-Themed Websites Vietnamese Hackers Distribute Malware via Fake AI-Themed Websites Security Week News
North Korean Hackers Steal 5M from DeFi Platform North Korean Hackers Steal $285M from DeFi Platform Security Week News
Four Arrested in UK Over M&S, Co-op Cyberattacks Four Arrested in UK Over M&S, Co-op Cyberattacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity Threats: SMS Blaster, OpenEMR, and Roblox Hacks
  • Critical ProFTPD Vulnerability Allows Remote Code Execution
  • Gemini CLI Security Flaw Could Lead to Supply Chain Attacks
  • Stealthy Python Backdoor Targets Cloud Credentials
  • Critical ConnectWise ScreenConnect Flaw Under Exploitation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity Threats: SMS Blaster, OpenEMR, and Roblox Hacks
  • Critical ProFTPD Vulnerability Allows Remote Code Execution
  • Gemini CLI Security Flaw Could Lead to Supply Chain Attacks
  • Stealthy Python Backdoor Targets Cloud Credentials
  • Critical ConnectWise ScreenConnect Flaw Under Exploitation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark