Janitza UMG Power Quality Measuring Products Vulnerabilities
Janitza UMG power quality meters contain multiple vulnerabilities affecting authentication, credential storage, and information disclosure. The devices include weaknesses in password management (CWE-521, CWE-259), weak random number generation (CWE-330), improper access controls, cross-site scripting (CWE-79), cross-site request forgery (CWE-352), and information leakage (CWE-200, CWE-215). These weaknesses allow unauthenticated network access to sensitive configuration and operational data, and may permit unauthorized modification of device settings.
- Network access to the UMG device's IP address and port (typically HTTP/HTTPS port)
- No valid credentials required for exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c3da5a4f-0e94-491a-941d-b7bc3a9c1386Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.