METZ CONNECT’s Firmware Fiasco: Hackers’ Dream or IT’s Worst Nightmare?

View CSAF: The METZ CONNECT EWIO2 devices have vulnerabilities so severe, they might as well leave the front door open with cookies on the table. With a CVSS v4 score of 9.3, these vulnerabilities allow remote attackers to bypass authentication and execute arbitrary code. Time to update that firmware and keep your network safe!

Pro Dashboard

Hot Take:

Looks like METZ CONNECT just pulled a cybersecurity “oopsie-daisy” with their EWIO2 series, making it easier for attackers to dance through their vulnerabilities like they’re at a wedding reception. Time to update that firmware faster than you can say “I do” to a secure network!

Key Points:

  • METZ CONNECT’s EWIO2 devices are plagued by a party of vulnerabilities with CVSS v4 score of 9.3.
  • These vulnerabilities allow bypassing authentication, remote code execution, and more.
  • The affected METZ CONNECT products include firmware versions below 2.2.0 on EWIO2-M, EWIO2-M-BM, and EWIO2-BM hardware.
  • Firmware version 2.2.0 is the knight in shining armor that patches these vulnerabilities.
  • CISA suggests users update, firewall their networks, and avoid unsolicited emails to stay safe.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?