SAUTER EY-modulo 5 Building Automation Stations
SAUTER EY-modulo 5 Building Automation Station (EY-AS525F001) with moduWeb contains multiple vulnerabilities (CWE-79 cross-site scripting, CWE-319 unencrypted communication, CWE-434 unrestricted file upload) that allow remote privilege escalation, unauthorized execution of actions, denial of service, and retrieval of sensitive building configuration data. The product does not support encryption on its communication protocols and is not suitable for open networks. SAUTER states this product line will not be patched and recommends upgrading to EY6AS80F021 with moduWeb Unity.
- Network access to the EY-AS525F001 device on the same network segment or open network
- No authentication or valid credentials required for basic exploitation
- Device running moduWeb interface without encryption enabled
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3545e6f1-0cbf-4394-80b6-85a369b7f0f5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.