METZ CONNECT EWIO2
A critical authentication bypass in the METZ CONNECT EWIO2 configuration API allows unauthenticated attackers with network access to gain administrative control. The vulnerability exists in the config API authentication mechanism, affecting EWIO2-M, EWIO2-M-BM, and EWIO2-BM devices running firmware versions below 2.2.0. An attacker can leverage this to change device configurations, manipulate operational data, disrupt services, and potentially render the device non-functional. The vendor has released firmware version 2.2.0 which fixes the authentication bypass.
- Network access to the EWIO2 device (no credentials required)
- EWIO2 firmware version below 2.2.0
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2e7d9417-ef55-4045-8e8e-3fd64acb62d1Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.