News

EnOcean SmartServer CVE-2026-20761 Opens Buildings to Remote Takeover

EnOcean SmartServer CVE-2026-20761 Opens Buildings to Remote Takeover

Two vulnerabilities discovered by Claroty’s Team82 in the EnOcean SmartServer IoT platform can be chained to achieve unauthenticated remote code execution on devices managing building automation systems — including HVAC, lighting, and energy controls. CVE-2026-20761 (CVSS 8.1) allows arbitrary OS command execution via malformed IP-852 messages; CVE-2026-22885 (CVSS 3.7) bypasses ASLR and leaks memory to make exploitation reliable. Both affect SmartServer IoT versions up to and including 4.60.009, and patches are available in version 4.60.023.

CVE-2026-20761: What We Know So Far

Claroty Team82 researchers identified the vulnerabilities in the EnOcean SmartServer IoT, a widely deployed edge gateway used in building management systems (BMS) to bridge LonWorks-based sensors and controllers with BACnet, Modbus, and IP networks.

CVE-2026-20761 targets the device’s LON IP-852 protocol handler. An unauthenticated remote attacker can send a specially crafted IP-852 message that triggers arbitrary operating system command execution. The flaw exists in how the SmartServer firmware processes malformed time-synchronization and configuration messages on the LonWorks channel — a network path that is often accessible from the building’s LAN segment without authentication. CVSS v3 score: 8.1 (High).

CVE-2026-22885 is a lower-severity companion flaw (CVSS 3.7) that also exploits crafted IP-852 messages to bypass Address Space Layout Randomization (ASLR) and disclose memory contents. Alone it does not execute code, but it is the essential prerequisite: an attacker first uses CVE-2026-22885 to leak memory addresses and defeat ASLR, then delivers a reliable RCE payload via CVE-2026-20761 at a predictable address. Chained, the two flaws allow a network-adjacent or internet-facing attacker to fully compromise a SmartServer with root-level access.

CISA issued advisory ICSA-26-050-01 on February 19, 2026 when EnOcean coordinated disclosure. Claroty has now published technical details on its Team82 disclosure dashboard for CVE-2026-20761 and CVE-2026-22885, making the attack mechanics more accessible to both defenders and potential threat actors.

No public proof-of-concept exploit code has been released at time of writing. No confirmed in-the-wild exploitation has been reported by CISA or EnOcean.

Why CVE-2026-20761 Matters

The EnOcean SmartServer IoT is a critical junction point in building management infrastructure. It speaks multiple OT protocols — LonWorks, BACnet/IP, BACnet MS/TP, Modbus RTU, Modbus TCP — and aggregates sensors covering HVAC, energy metering, lighting, access control, and environmental monitoring. A compromised SmartServer gives an attacker operational authority over a building’s physical systems.

Consequences of a successful compromise include:

  • Altering HVAC set points to create unsafe temperature conditions in server rooms, pharmaceutical cold storage, or hospital patient areas
  • Manipulating energy management schedules to cause equipment overloads or unplanned downtime
  • Lateral movement to other OT/IoT devices and backend BMS servers on the same network segment
  • Exfiltration of building occupancy data, sensor telemetry, and facility layout information useful for physical intrusion planning

The attack surface is broader than it appears. IP-852 is the IP tunneling protocol for LonWorks networks, and in many enterprise building installations the SmartServer’s management port is reachable from the corporate LAN or — in misconfigured deployments — directly from the internet. Facilities where SmartServers are integrated into their BMS without proper network segmentation are at elevated risk.

CVE-2026-20761: What You Should Do Now

  1. Patch immediately. Update EnOcean SmartServer IoT to version 4.60.023 or later, which resolves both CVE-2026-20761 and CVE-2026-22885. Firmware version 4.7.0 also includes the fix. Verify the running version from the SmartServer web UI at http://<device-ip>/web or via the device CLI.
  2. Audit network exposure. Identify all SmartServer IoT devices in your environment. Confirm that management interfaces and IP-852 ports (UDP/TCP 1628) are not reachable from untrusted network segments or the internet.
  3. Segment the OT network. Place SmartServer devices behind a dedicated OT VLAN or DMZ. Restrict IP-852 traffic to known BMS hosts using firewall rules (deny all; permit src <BMS_host_IP> dst <SmartServer_IP> port 1628).
  4. Verify external exposure. Use Shodan, Censys, or your external attack surface management tool to confirm no SmartServer management interface is internet-facing. Search for "EnOcean SmartServer" port:1628 or the device’s web fingerprint.
  5. Review device logs. Examine SmartServer syslog output for unexpected process spawns or anomalous IP-852 traffic. Successful exploitation of CVE-2026-20761 would leave traces of unexpected child processes in the system log.

Detection and Verification Checklist

  • Confirm running firmware is ≥ 4.60.023 via the SmartServer web UI or CLI output.
  • Run nmap -sU -sT -p 1628 <smartserver-ip> from a test host outside the OT segment to verify IP-852 port is not accessible cross-segment.
  • Review perimeter firewall logs for inbound traffic to port 1628 from external IP ranges.
  • Audit syslog entries for unexpected process execution events since February 19, 2026 (original disclosure date).
  • Review the CISA ICS advisory ICSA-26-050-01 for vendor-supplied indicators of compromise and configuration guidance.
  • Monitor the Claroty Team82 disclosure pages for CVE-2026-20761 and CVE-2026-22885 — if a public PoC is published, escalate remediation priority to emergency.
  • Subscribe to EnOcean security notifications to receive future advisories directly.

Sources: SecurityWeek, Claroty Team82 — CVE-2026-20761, Claroty Team82 — CVE-2026-22885, CISA ICSA-26-050-01

For any query contact us at contact@cipherssecurity.com

Leave a Reply

Your email address will not be published. Required fields are marked *