METZ CONNECT’s Firmware Fiasco: Hackers’ Dream or IT’s Worst Nightmare?
View CSAF: The METZ CONNECT EWIO2 devices have vulnerabilities so severe, they might as well leave the front door open with cookies on the table. With a CVSS v4 score of 9.3, these vulnerabilities allow remote attackers to bypass authentication and execute arbitrary code. Time to update that firmware and keep your network safe!

Hot Take:
Looks like METZ CONNECT just pulled a cybersecurity “oopsie-daisy” with their EWIO2 series, making it easier for attackers to dance through their vulnerabilities like they’re at a wedding reception. Time to update that firmware faster than you can say “I do” to a secure network!
Key Points:
- METZ CONNECT’s EWIO2 devices are plagued by a party of vulnerabilities with CVSS v4 score of 9.3.
- These vulnerabilities allow bypassing authentication, remote code execution, and more.
- The affected METZ CONNECT products include firmware versions below 2.2.0 on EWIO2-M, EWIO2-M-BM, and EWIO2-BM hardware.
- Firmware version 2.2.0 is the knight in shining armor that patches these vulnerabilities.
- CISA suggests users update, firewall their networks, and avoid unsolicited emails to stay safe.
Already a member? Log in here
