U.motion Servers and Touch Panels
Schneider Electric has identified multiple vulnerabilities in U.motion KNX servers and touch panel products, including authorization bypass (CWE-863) and SQL injection (CWE-89) flaws. These vulnerabilities affect the MTN6501-0001, MTN6501-0002, MTN6260-0410, MTN6260-0415, MTN6260-0310, and MTN6260-0315 product lines. An authenticated attacker could exploit these issues to access unauthorized data or modify building automation configuration. All affected products are vulnerable in versions prior to 1.4.2.
- Valid user credentials for the U.motion web interface
- Network access to the U.motion server on its management port (typically HTTP/HTTPS)
- Knowledge of vulnerable input fields or authorization paths
Patching may require device reboot — plan for process interruption
/api/v1/advisories/cd6fc83c-0c5d-4bb1-8a5b-978bf8ef6fb3Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.