Optergy Proton Enterprise Building Management System
Optergy Proton and Enterprise versions 2.3.0a and earlier contain multiple critical vulnerabilities (CWE-200 information disclosure, CWE-352 CSRF, CWE-434 file upload, CWE-601 open redirect, CWE-798 hardcoded credentials, CWE-912 path traversal, CWE-749 unsafe deserialization) that allow remote code execution and full system compromise. An unauthenticated attacker on the network can exploit these flaws to gain administrative control of the building management system. The CVSS v3.0 score is 10.0 (critical) with network vector, low attack complexity, and no privileges or user interaction required. No public exploits are currently known, but the EPSS score of 92.6% indicates high probability of exploitation.
- Network connectivity to the Optergy server
- Optergy version 2.3.0a or earlier deployed
- Port 22 (SSH) or other vulnerable ports exposed to untrusted networks
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8cbe9848-0059-4f8a-89ed-739e8309cb94