KiloView Encoder Series (Update A)
KiloView Encoder Series devices (RE1, E1, E1-s, G1, P1, P2, E2) are vulnerable to unauthorized administrator account creation or deletion. An unauthenticated attacker with network access can create new administrative accounts or remove existing ones, gaining full control of the encoder. The vulnerability exists due to missing or inadequate authentication checks on account management functions. Affected hardware versions include RE1 (4.8.2519, 4.8.2561, 4.8.2611, 4.8.2525, 4.7.2513), E1 (4.7.2511, 4.8.2523, 4.8.2611, 4.6.2400, 4.7.2512, 4.8.2561, 4.8.2554, 4.3.2029, 4.8.2555, 4.6.2408, 4.7.2516), E1-s (4.7.2516, 4.8.2519, 4.8.2525, 4.8.2611, 4.8.2561, 4.8.2554, 4.8.2523), G1 (4.8.2561), P1 (4.8.2633, 4.8.2608), P2 (4.8.2633), and E2 (4.8.2611, 4.8.2561, 4.8.2523, 4.8.2554). KiloView has designated these hardware versions as end-of-life and will not release patches due to hardware limitations.
- Network access to the KiloView Encoder device and its administrative port (typically HTTP/HTTPS)
- No credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/204590f3-99a0-42c5-9b56-c922037c3845Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.