Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
EnOcean SmartServer Security Flaws Threaten Remote Hacks

EnOcean SmartServer Security Flaws Threaten Remote Hacks

Posted on April 30, 2026 By CWS

Security vulnerabilities have been identified in the EnOcean SmartServer IoT platform, posing a risk of remote hacking to building management systems. These findings, revealed by researchers from the cybersecurity firm Claroty, highlight potential threats to the systems that manage smart buildings, industrial facilities, and data centers.

Details of the EnOcean SmartServer Platform

The EnOcean SmartServer serves as a multi-protocol gateway and edge controller, facilitating the integration of industrial devices with cloud-based management solutions. Promoted as an ideal option for smart and automated environments, it now faces scrutiny due to the newly discovered vulnerabilities.

Claroty’s research pinpointed two critical flaws: a security bypass vulnerability, labeled CVE-2026-22885, and a remote code execution flaw, tracked as CVE-2026-20761. These vulnerabilities could be harnessed by attackers to compromise internet-connected EnOcean devices, enabling unauthorized memory access and command execution.

Potential Impact of the Vulnerabilities

The exploitation of these vulnerabilities allows attackers to manipulate the argument passed to the device’s system calls, potentially leading to a complete takeover of the Linux-based device. This could result in gaining root access and executing arbitrary code, thereby compromising the entire building management system.

In practical terms, such vulnerabilities could be leveraged by malicious entities to gain control over critical automation systems in buildings, posing a significant threat to infrastructure security.

Response and Mitigation Efforts

In response to these findings, EnOcean has been alerted and has released a patch in the form of SmartServer 4.6 update 2 (4.60.023) to address the identified security issues. It’s important to note that these vulnerabilities also affect older models, specifically legacy i.LON devices.

Claroty has provided technical details along with proof-of-concept exploits to inform and assist in mitigating these risks. The disclosure underscores the importance of regular updates and vigilance in securing IoT platforms against evolving cyber threats.

For additional context, similar vulnerabilities have been noted in other systems, such as internet-facing VNC servers and serial-to-IP converters, emphasizing the pervasive nature of security challenges in industrial and healthcare settings.

In conclusion, while the release of patches by EnOcean is a positive step, ongoing vigilance and prompt application of security updates remain crucial to protect against potential exploitation.

Security Week News Tags:building automation, Claroty, CVE-2026-20761, CVE-2026-22885, cyber-physical systems, Cybersecurity, EnOcean, ICS security, IoT security, remote hacking, SmartServer

Post navigation

Previous Post: KarstoRAT Malware Threatens with Extensive Control Abilities
Next Post: Critical ConnectWise ScreenConnect Flaw Under Exploitation

Related Posts

Jaguar Land Rover Says Shutdown Will Continue Until at Least Oct 1 After Cyberattack Jaguar Land Rover Says Shutdown Will Continue Until at Least Oct 1 After Cyberattack Security Week News
In Other News: PQC Adoption, New Android Spyware, FEMA Data Breach In Other News: PQC Adoption, New Android Spyware, FEMA Data Breach Security Week News
Iranian APT Targets Android Users With New Variants of DCHSpy Spyware Iranian APT Targets Android Users With New Variants of DCHSpy Spyware Security Week News
Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products Security Week News
MokN Raises  Million for Phish-Back Solution MokN Raises $3 Million for Phish-Back Solution Security Week News
Coupang to Issue .17 Billion in Vouchers Over Data Breach Coupang to Issue $1.17 Billion in Vouchers Over Data Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Gemini CLI Security Flaw Could Lead to Supply Chain Attacks
  • Stealthy Python Backdoor Targets Cloud Credentials
  • Critical ConnectWise ScreenConnect Flaw Under Exploitation
  • EnOcean SmartServer Security Flaws Threaten Remote Hacks
  • KarstoRAT Malware Threatens with Extensive Control Abilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Gemini CLI Security Flaw Could Lead to Supply Chain Attacks
  • Stealthy Python Backdoor Targets Cloud Credentials
  • Critical ConnectWise ScreenConnect Flaw Under Exploitation
  • EnOcean SmartServer Security Flaws Threaten Remote Hacks
  • KarstoRAT Malware Threatens with Extensive Control Abilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark