Vulnerabilities > Lutron

DATE CVE VULNERABILITY TITLE RISK
2018-06-02 CVE-2018-11682 Use of Hard-coded Credentials vulnerability in Lutron products
Default and unremovable support credentials allow attackers to gain total super user control of an IoT device through a TELNET session to products using the Stanza Lutron integration protocol Revision M to Revision Y.
network
low complexity
lutron CWE-798
critical
9.8
2018-06-02 CVE-2018-11681 Use of Hard-coded Credentials vulnerability in Lutron products
Default and unremovable support credentials (user:nwk password:nwk2) allow attackers to gain total super user control of an IoT device through a TELNET session to products using the RadioRA 2 Lutron integration protocol Revision M to Revision Y.
network
low complexity
lutron CWE-798
critical
9.8
2018-06-02 CVE-2018-11629 Use of Hard-coded Credentials vulnerability in Lutron products
Default and unremovable support credentials (user:lutron password:integration) allow attackers to gain total super user control of an IoT device through a TELNET session to products using the HomeWorks QS Lutron integration protocol Revision M to Revision Y.
network
low complexity
lutron CWE-798
critical
9.8
2018-04-23 CVE-2018-8880 Information Exposure vulnerability in Lutron Quantum Bacnet Integration Firmware 3.2.243
Lutron Quantum BACnet Integration 2.0 (firmware 3.2.243) doesn't check for correct user authentication before showing the /deviceIP information, which leads to internal network information disclosure.
network
low complexity
lutron CWE-200
5.0
2018-02-21 CVE-2018-7276 Information Exposure vulnerability in Lutron Quantum Bacnet Integration Firmware 3.2.243
An issue was discovered on Lutron Quantum BACnet Integration 2.0 (firmware 3.2.243) devices.
network
low complexity
lutron CWE-200
5.0