Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Workaround
To ensure the highest level of security when using the Ewon Flexy device, HMS strongly recommend following these best practices: * Integrate with Talk2M Cloud: Always use the Flexy device in conjunction with Talk2M cloud. This guarantees a robust security level for your remote access connections. * Follow the the guidelines outlined here: Best Practices for Secure Usage of the Ewon Solution https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/ewon/manuals-and-guides---installation-guides/best-practices-for-a-secure-usage-of-the-ewon-solution-en.pdf * Disable Unused Protocols: Regularly review and disable any unsecure protocols that are not in use. Learn how to do this here: How to Block Unused Ewon Services https://support.hms-networks.com/hc/en-us/articles/19393244940818-How-to-block-all-the-unused-Ewon-Flexy-Cosy131-services-on-the-LAN-WAN-and-or-VPN-interface For further information, please visit the HMS Security Advisories https://www.hms-networks.com/cyber-security page.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-1665 | EWON Flexy 202 transmits user credentials in clear text with no encryption when a user is added, or user credentials are changed via its webpage. |
Tue, 28 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Jan 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | EWON Flexy 202 transmits user credentials in clear text with no encryption when a user is added, or user credentials are changed via its webpage. | |
| Title | HMS Networks Ewon Flexy 202 Cleartext Transmission of Sensitive Information | |
| Weaknesses | CWE-319 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-28T16:32:42.081Z
Reserved: 2025-01-13T21:36:12.484Z
Link: CVE-2025-0432
Updated: 2025-01-28T16:30:18.585Z
Status : Deferred
Published: 2025-01-28T16:15:40.183
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-0432
No data.
OpenCVE Enrichment
No data.
EUVD