First published: Tue Jul 03 2018(Updated: )
In Schneider Electric Wiser for KNX V2.1.0 and prior, homeLYnk V2.0.1 and prior; and spaceLYnk V2.1.0 and prior, weak and unprotected FTP access could allow an attacker unauthorized access.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Homelynk Firmware | <=2.0.1 | |
Schneider-electric Homelynk | ||
Schneider-electric Spacelynk Firmware | <=2.1.0 | |
Schneider-electric Spacelynk | ||
Schneider-electric Wiser For Knx Firmware | <=2.1.0 | |
Schneider-electric Wiser For Knx |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7779 has been classified as a high severity vulnerability due to weak and unprotected FTP access allowing unauthorized access.
To fix CVE-2018-7779, update to the latest firmware versions for Schneider Electric products that address this vulnerability.
CVE-2018-7779 affects Schneider Electric Wiser for KNX V2.1.0 and prior, homeLYnk V2.0.1 and prior, and spaceLYnk V2.1.0 and prior.
Impacted products include Schneider Electric's Wiser for KNX, homeLYnk, and spaceLYnk firmware.
Currently, the best approach for mitigating CVE-2018-7779 is to apply the available firmware updates.