Description
A vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and
prior, which would allow remote attackers, in the LON IP-852 management
messages, to send specially crafted IP-852 messages resulting in a
memory leak from the program's memory.
Published: 2026-02-20
Score: 3.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure via Out-of-bounds Read
Action: Apply Patch
AI Analysis

Impact

A vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and earlier, where remote attackers can send specially crafted LON IP-852 management messages that trigger an out‑of‑bounds read and produce a memory leak. This CWE‑125 issue allows the program to release sensitive contents from its memory, potentially exposing confidential data stored in the device. The flaw does not provide direct code execution, but the leaked information could be used for further attacks such as credential reuse or targeted exploitation.

Affected Systems

The affected product is EnOcean Edge Inc’s SmartServer IoT platform. Versions 4.60.009 and any prior releases are vulnerable. EnOcean recommends upgrading to SmartServer 4.6 Update 2 (v4.60.023) or a newer release to mitigate the problem.

Risk and Exploitability

The CVSS score of 3.7 indicates a moderate risk, and the EPSS score of less than 1% shows a very low likelihood that this vulnerability will be actively exploited. The vulnerability is not listed in the CISA KEV catalog, further suggesting limited current exploitation. The attack would occur over the network—remote attackers could craft IP‑852 messages to trigger the memory leak, so network access to SmartServer devices is a prerequisite. The overall risk is moderate, but remediation is recommended to prevent potential data disclosure.

Generated by OpenCVE AI on April 18, 2026 at 11:33 UTC.

Remediation

Vendor Solution

EnOcean recommends users update the SmartServer platform software to SmartServer 4.6 Update 2 (v4.60.023) or a later release at https://enoceanwiki.atlassian.net/wiki/spaces/DrftSSIoT/pages/1475410/SmartServer+IoT+Release+Notes#... https://enoceanwiki.atlassian.net/wiki/spaces/DrftSSIoT/pages/1475410/SmartServer+IoT+Release+Notes#Current-Stable-Release .


Vendor Workaround

For additional mitigations and workarounds, refer to EnOcean's hardening guide at https://enoceanwiki.atlassian.net/wiki/spaces/IEC/pages/288063529/Enhancing+Security .


OpenCVE Recommended Actions

  • Update the SmartServer platform software to version 4.60.023 or later as recommended by EnOcean.
  • Follow the EnOcean hardening guide to apply additional mitigations and limit exposure from undesired network traffic.
  • Configure network controls such as firewall rules or segmentation to restrict IP‑852 traffic to trusted management interfaces only, blocking unsolicited and potentially malicious messages.

Generated by OpenCVE AI on April 18, 2026 at 11:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Enocean Edge
Enocean Edge smartserver Iot
Vendors & Products Enocean Edge
Enocean Edge smartserver Iot

Fri, 20 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 16:00:00 +0000

Type Values Removed Values Added
Description A vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and prior, which would allow remote attackers, in the LON IP-852 management messages, to send specially crafted IP-852 messages resulting in a memory leak from the program's memory.
Title EnOcean SmartServer IoT Out-of-bounds Read
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Enocean Edge Smartserver Iot
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-02-20T20:06:44.163Z

Reserved: 2026-02-12T00:19:51.033Z

Link: CVE-2026-22885

cve-icon Vulnrichment

Updated: 2026-02-20T20:06:33.857Z

cve-icon NVD

Status : Deferred

Published: 2026-02-20T16:22:38.220

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-22885

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:45:44Z

Weaknesses