EWON Flexy 202 transmits user credentials in clear text with no encryption when a user is added, or user credentials are changed via its webpage.
Fixes

Solution

No solution given by the vendor.


Workaround

To ensure the highest level of security when using the Ewon Flexy device, HMS strongly recommend following these best practices: * Integrate with Talk2M Cloud: Always use the Flexy device in conjunction with Talk2M cloud. This guarantees a robust security level for your remote access connections. * Follow the the guidelines outlined here: Best Practices for Secure Usage of the Ewon Solution https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/ewon/manuals-and-guides---installation-guides/best-practices-for-a-secure-usage-of-the-ewon-solution-en.pdf * Disable Unused Protocols: Regularly review and disable any unsecure protocols that are not in use. Learn how to do this here: How to Block Unused Ewon Services https://support.hms-networks.com/hc/en-us/articles/19393244940818-How-to-block-all-the-unused-Ewon-Flexy-Cosy131-services-on-the-LAN-WAN-and-or-VPN-interface For further information, please visit the HMS Security Advisories https://www.hms-networks.com/cyber-security  page.

History

Tue, 28 Jan 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 28 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
Description EWON Flexy 202 transmits user credentials in clear text with no encryption when a user is added, or user credentials are changed via its webpage.
Title HMS Networks Ewon Flexy 202 Cleartext Transmission of Sensitive Information
Weaknesses CWE-319
References
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-01-28T16:32:42.081Z

Reserved: 2025-01-13T21:36:12.484Z

Link: CVE-2025-0432

cve-icon Vulnrichment

Updated: 2025-01-28T16:30:18.585Z

cve-icon NVD

Status : Received

Published: 2025-01-28T16:15:40.183

Modified: 2025-01-28T16:15:40.183

Link: CVE-2025-0432

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.