Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22885: CWE-125 in EnOcean Edge Inc SmartServer IoT

0
Low
VulnerabilityCVE-2026-22885cvecve-2026-22885cwe-125
Published: Fri Feb 20 2026 (02/20/2026, 15:35:02 UTC)
Source: CVE Database V5
Vendor/Project: EnOcean Edge Inc
Product: SmartServer IoT

Description

A vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and prior, which would allow remote attackers, in the LON IP-852 management messages, to send specially crafted IP-852 messages resulting in a memory leak from the program's memory.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:19:28 UTC

Technical Analysis

CVE-2026-22885 identifies a vulnerability in EnOcean Edge Inc's SmartServer IoT product, specifically versions 4.60.009 and earlier. The vulnerability arises from improper processing of LON IP-852 management messages, which are part of the LonWorks protocol used for building automation and IoT device communication. An attacker can send specially crafted IP-852 messages remotely to the SmartServer, triggering a memory leak due to an out-of-bounds read condition (CWE-125). This memory leak could potentially allow an attacker to glean sensitive information from the device's memory, compromising confidentiality. The vulnerability does not affect the integrity or availability of the system. The CVSS v3.1 base score is 3.7, reflecting low severity due to the high attack complexity, lack of required privileges, and no user interaction needed. The attack vector is network-based, meaning the attacker can exploit the vulnerability remotely without authentication. No patches or fixes have been released at the time of publication, and there are no known exploits in the wild. The affected product is commonly deployed in IoT environments for smart building and industrial automation, where LON IP-852 protocol is used for device management and communication.

Potential Impact

The primary impact of this vulnerability is a memory leak that could lead to unauthorized disclosure of information from the device's memory, potentially exposing sensitive configuration or operational data. While the vulnerability does not allow direct control or disruption of the device, the information gained could aid attackers in further reconnaissance or subsequent attacks. Organizations relying on EnOcean SmartServer IoT for critical building automation or industrial control may face risks of data exposure, which could undermine operational security or privacy. Since the vulnerability does not affect system integrity or availability, it is less likely to cause immediate operational disruptions. However, in environments where confidentiality is paramount, such as government facilities, healthcare, or critical infrastructure, even low-severity leaks can have significant consequences. The lack of authentication requirements and remote exploitability increases the attack surface, especially if devices are exposed to untrusted networks or insufficiently segmented environments.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict network segmentation to isolate EnOcean SmartServer IoT devices from untrusted or public networks, limiting exposure to potential attackers. Deploy firewall rules or access control lists (ACLs) to restrict inbound LON IP-852 traffic only to trusted management stations or networks. Monitor network traffic for anomalous or malformed IP-852 messages that could indicate exploitation attempts. Since no official patches are available, consider working with EnOcean Edge Inc to obtain updates or apply vendor-recommended workarounds as they become available. Conduct regular security assessments and penetration testing focused on IoT and building automation systems to identify and remediate similar vulnerabilities. Additionally, maintain an inventory of all IoT devices and ensure firmware is updated promptly when patches are released. Employ intrusion detection systems (IDS) capable of recognizing unusual LON protocol activity to provide early warning of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-12T00:19:51.033Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6998c0ac2c4d84f260ce40ab

Added to database: 2/20/2026, 8:14:36 PM

Last enriched: 2/28/2026, 2:19:28 PM

Last updated: 4/3/2026, 8:54:57 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses