Browse all 4 CVE security advisories affecting Echelon. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Echelon is a network-centric command and control system primarily used for industrial automation and critical infrastructure monitoring. Historically, it has been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and insecure default configurations. The system's exposure to operational technology environments has made it a target for sophisticated threat actors, with several incidents involving unauthorized access and potential disruption of industrial processes. Its integration with legacy systems and complex architecture presents ongoing security challenges, requiring continuous patch management and network segmentation to mitigate risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2018-10627 | Echelon SmartServer 1、SmartServer 2和i.LON 100 信息泄露漏洞 — SmartServer 1CWE-200 | 9.8 | - | 2018-07-24 |
| CVE-2018-8851 | 多款Echelon产品安全漏洞 — SmartServer 1CWE-256 | 9.8 | - | 2018-07-24 |
| CVE-2018-8855 | 多款Echelon产品安全漏洞 — SmartServer 1CWE-319 | 9.8 | - | 2018-07-24 |
| CVE-2018-8859 | Echelon SmartServer 1、SmartServer 2和i.LON 100 安全漏洞 — SmartServer 1CWE-288 | 9.8 | - | 2018-07-24 |
This page lists every published CVE security advisory associated with Echelon. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.