Carlo Gavazzi VMU-C EM and VMU-C PV
The VMU-C EM and VMU-C PV devices contain multiple vulnerabilities in access control and input validation that allow an unauthenticated attacker on the network to execute arbitrary commands on the device. The vulnerabilities affect the web server interface and stem from insufficient authentication, improper access restrictions, and information disclosure flaws. Exploitation requires only network access to the device and no valid credentials. These devices are commonly used for electrical power measurement (EM) and photovoltaic system monitoring (PV) in industrial and utility environments.
- Network access to the VMU-C device HTTP/web server port
- No authentication credentials required
- Device running vulnerable firmware versions (VMU-C EM < A11_U05 or VMU-C PV < A17)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e6852a5a-aeeb-426e-9dd3-a97d8684e623Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.