Entes EMG 12
The Entes EMG12 Ethernet Modbus Gateway (firmware version 2.57 and earlier) contains authentication and access control vulnerabilities (CWE-287, CWE-598) that allow unauthenticated remote attackers to gain unauthorized access and modify device configuration or settings. The vulnerabilities exist in the device's handling of Ethernet-based requests and credential validation. An attacker who can reach the device on the network can exploit these flaws without valid credentials or user interaction. Successfully exploited, these vulnerabilities could allow an attacker to alter Modbus gateway settings, reroute communications, or disable critical control functions.
- Network access to the EMG12 device (Ethernet port 502 or management interface)
- No valid credentials required
- Device must be reachable from attacker's network segment
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c2aaecb0-506a-4c90-a194-a5a9d355e927Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.