Carrier LenelS2 HID Mercury access panels
Multiple vulnerabilities in HID Mercury access panels sold by LenelS2 allow remote attackers to gain unauthorized access to the device without credentials. Successful exploitation could enable an attacker to eavesdrop on all communications to and from the panel, modify onboard relays to alter access control state, change configuration files, cause device instability, or trigger denial of service. The vulnerabilities stem from improper access controls (CWE-693, CWE-425), buffer overflows (CWE-120), path traversal (CWE-22), and command injection (CWE-78).
- Network access to the device on the management/web access port
- Device must be reachable from attacker's network segment or the Internet (if not firewalled)
- No authentication required for initial exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3f0e5e05-2a2e-4095-a9d8-f9be271fb0a8Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.