Echelon SmartServer 1, SmartServer 2, SmartServer 3, i.LON 100, i.LON 600 (Update A)
Multiple vulnerabilities in Echelon SmartServer and i.LON devices allow remote code execution due to insufficient input validation, weak authentication mechanisms, plaintext credential storage, and unencrypted communications. Affected versions: SmartServer 1 (all versions), SmartServer 2 (versions before 4.11.007), i.LON 100 (all versions), and i.LON 600 (all versions). Successful exploitation allows an unauthenticated attacker on the network to execute arbitrary code on the device, potentially compromising the integrity and availability of networked industrial devices and systems.
- Network access to the device on its standard ports (typically HTTP/HTTPS or proprietary protocols)
- No credentials required for exploitation of primary vulnerabilities
- Device must be reachable from the attacker's network segment
Patching may require device reboot — plan for process interruption
/api/v1/advisories/4e0c3a1b-9c52-477f-bd69-00f24d626332Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.