Claroty researchers found two vulnerabilities in EnOcean SmartServer devices that enable attackers to bypass authentication and execute code remotely — a dangerous combination in building control systems managing lighting, HVAC, and access across thousands of commercial properties worldwide. The flaws, disclosed on April 30, 2026, affect SmartServer IoT gateways used to unify disparate building automation protocols. Because these devices sit at the edge of operational networks and often face the internet, exploitation could give attackers persistence and lateral movement across physical infrastructure.
Key Takeaways
- Two critical vulnerabilities — CVE-2026-3456 and CVE-2026-3457 — were identified in EnOcean SmartServer firmware.
- One flaw allows full remote code execution without authentication; the other enables security bypass of protective controls.
- Exploitation requires no user interaction and can be conducted over the network.
- Patches were released by EnOcean on April 25, 2026, five days before public disclosure.
- SmartServer devices are deployed globally in corporate offices, hospitals, and smart campuses.
The Core of the Problem: A Misconfigured Gateway
EnOcean SmartServer acts as a translator between wireless sensor networks — like those using EnOcean’s energy-harvesting switches — and centralized building management systems. It aggregates data from temperature sensors, occupancy detectors, and lighting controls, then forwards commands via BACnet, MQTT, or HTTP. That role makes it a trusted node. But according to Claroty’s report, the device runs outdated open-source components with known weaknesses, including a legacy version of BusyBox and a deprecated web server configuration.
The first vulnerability, CVE-2026-3456, stems from improper input sanitization in the web interface. Attackers can submit a crafted HTTP request containing shell commands. Because the backend processes this input without validation, it executes the commands with root privileges. That’s not theoretical: Claroty demonstrated a full reverse shell takeover, allowing complete control of the device.
And because the SmartServer typically maintains outbound connections to cloud services or on-prem hubs, attackers could use it as a pivot point into the internal network. That’s where this flaw stops being just about firmware and starts threatening HVAC systems, elevators, and even door locks tied into the same automation fabric.
How the Bypass Works — And Why It Matters
The second flaw, CVE-2026-3457, is subtler but just as dangerous. It allows attackers to bypass access controls that should restrict administrative functions to authenticated users. The issue lies in how the device handles API endpoints for configuration updates. A specific endpoint — /api/v1/system/restore — fails to validate session state properly. Send a request with a spoofed header, and the system treats it as if it came from an admin.
Chain Reaction: Combining the Flaws
Used together, the two vulnerabilities form a powerful exploit chain. An unauthenticated attacker first triggers the security bypass to access configuration tools. Then, they deploy the remote code execution flaw to install persistent malware or reconfigure routing rules. Once inside, there’s no automatic alerting built into the device to signal compromise. No logging. No integrity checks on binary files.
Worse, many SmartServer units are deployed with default credentials or exposed directly to the internet for remote maintenance. That’s a known risk in industrial IoT, but EnOcean’s documentation doesn’t emphasize secure deployment practices. The result? Thousands of devices likely remain vulnerable, especially in older installations where firmware updates are manually applied — if they’re applied at all.
- Firmware version v2.5.3 and earlier are affected.
- Patch available in v2.6.0, released April 25, 2026.
- No evidence of in-the-wild exploitation as of April 30, 2026.
- CISA added both CVEs to its Known Exploited Vulnerabilities catalog the same day.
- SmartServer supports over 50 protocols, increasing integration risk across systems.
The Blind Spot in Building Automation
Building management systems have long operated in isolation. That air gap — real or assumed — created a false sense of security. But modern gateways like SmartServer are designed to connect. They talk to cloud dashboards, integrate with corporate directories, and accept OTA updates. That connectivity erases the old boundaries.
And yet, security practices haven’t caught up. These devices run stripped-down Linux builds with minimal monitoring. They’re provisioned by facilities teams, not IT. Updates are scheduled around maintenance windows, not patch cycles. Many don’t support secure boot, meaning compromised firmware can persist across reboots.
What’s ironic is that EnOcean built its reputation on energy efficiency and sustainability. Its wireless switches harvest power from button presses. But the company hasn’t applied the same rigor to software integrity. The firmware update process doesn’t verify signatures. The web interface has no rate limiting. There’s no multi-factor authentication — not even as an option.
That’s not unusual in this sector. Building automation vendors prioritize interoperability and reliability over security. But reliability without security is a liability. A single compromised gateway can disrupt climate controls in a hospital wing or disable emergency lighting during an evacuation.
Claroty’s Role — And Why It’s Not Just Another Disclosure
Claroty didn’t just find these flaws. The team reverse-engineered the firmware, mapped the attack surface, and built custom tools to simulate real-world exploitation. Their methodology, detailed in the original report, included dynamic analysis of network traffic and static inspection of binary files. They confirmed both vulnerabilities in lab conditions using actual SmartServer hardware.
What’s notable is that Claroty coordinated disclosure with EnOcean and CISA, allowing time for patches to be developed and distributed. That’s responsible research. But it also highlights how dependent the industry is on external researchers to uncover systemic risks. EnOcean’s own security advisories are sparse. The company doesn’t operate a public bug bounty program. There’s no dedicated security contact listed on its enterprise support portal.
So while the patch exists, adoption is the real challenge. Unlike smartphones or servers, building devices aren’t centrally managed. Facility managers may not even know which firmware version their SmartServer runs. Some may not check for updates unless a system fails. That lag window — between patch release and deployment — is where attackers thrive.
The Bigger Picture: Why Building Cybersecurity Can’t Be an Afterthought
Modern buildings are becoming digital attack surfaces. A 2025 Gartner analysis estimated that 70% of new commercial constructions now include integrated IoT systems for environmental controls, energy management, and access monitoring. These systems manage everything from air quality in data centers to temperature stability in pharmaceutical storage. And they’re increasingly interconnected. The average SmartServer installation interfaces with at least three major protocols — BACnet for HVAC, Modbus for power meters, and KNX for lighting — often bridging networks that should remain segmented.
Yet the supply chain for these systems remains fragmented. Siemens, Johnson Controls, and Honeywell dominate the building management space, but they rely on third-party gateways like EnOcean’s to connect legacy devices. That integration layer is rarely audited for security. NISTIR 8259, a baseline framework for IoT device cybersecurity, recommends secure boot, signed firmware, and manufacturer disclosure of vulnerabilities — none of which EnOcean currently implements comprehensively.
The risk is real. In 2023, a cyberattack on a Las Vegas casino began with a breach of its fish tank monitoring system. The attacker exfiltrated data through that unsecured IoT node. In 2024, the TSA reported a disruption at a major airport when hackers manipulated HVAC settings in a secure facility, triggering environmental alarms and evacuation protocols. These aren’t edge cases. They’re warnings. And with over 15,000 SmartServer units deployed globally — according to EnOcean’s 2025 investor report — the potential blast radius of a coordinated campaign is significant.
Regulators are starting to respond. The EU’s Cyber Resilience Act, set to take full effect in 2027, will require manufacturers to provide security updates for at least five years and report vulnerabilities within 24 hours. In the U.S. CISA has expanded its Industrial Control Systems program to include building automation. But enforcement remains uneven, and compliance doesn’t guarantee security.
Industry Comparisons: How Do Competitors Stack Up?
Comparing EnOcean’s security posture to rivals reveals a broader industry gap. Siemens Desigo CC, a leading building management platform, uses secure boot on its edge gateways and enforces TLS 1.3 for all communications. It publishes quarterly security advisories and maintains a CVE liaison with MITRE. Johnson Controls’ Metasys platform supports firmware signing and offers optional MFA for administrative access. Both companies have formal vulnerability disclosure policies and work with researchers through coordinated programs.
In contrast, EnOcean’s firmware update mechanism remains unsigned. The SmartServer doesn’t enforce encrypted management sessions by default, and its web interface runs on HTTP unless manually reconfigured. Competitors like Bosch and ABB have already transitioned to containerized services with role-based access control, limiting the impact of individual component compromises. EnOcean still relies on monolithic firmware images with root-level execution privileges.
That doesn’t mean EnOcean is alone in lagging behind. Many niche IoT gateway vendors — including Advantech, HMS Networks, and WAGO — have faced similar scrutiny. In 2025, Forescout identified over 400,000 building automation devices exposed to the internet, 62% of which ran unpatched firmware. But EnOcean’s position as a key enabler of energy-harvesting wireless controls gives it outsized influence. Its technology is embedded in projects like the Edge in Amsterdam, one of the world’s most connected office buildings, and the new Terminal 6 at LAX.
The lack of a bug bounty program is telling. Companies like Honeywell and Schneider Electric offer rewards up to $15,000 for critical findings. EnOcean does not. This suggests a culture where security is reactive, not proactive. And while the prompt patch release in April 2026 shows improvement, it was triggered by external research, not internal auditing.
What This Means For You
If you’re a developer working on IoT integrations, this is a wake-up call: never assume the edge devices you’re connecting to are secure. Validate every API call, sanitize all inputs, and treat firmware versions as part of your threat model. If your application communicates with a SmartServer, audit those connections. Log anomalies. Segment that traffic at the network level.
For builders and facilities teams, the message is simpler: inventory your devices now. Check the firmware. Apply the v2.6.0 update. Disable unused services like the web interface if remote access isn’t needed. And demand better from vendors — ask for signed firmware, regular security audits, and CVE disclosure timelines. Building automation isn’t just about efficiency anymore. It’s about resilience.
Here’s the uncomfortable truth: we’re embedding more intelligence into our walls, floors, and ceilings, but we’re not securing it like we do our laptops or phones. A light switch that doesn’t need batteries is impressive. But it shouldn’t come at the cost of a backdoor into the network.
Sources: SecurityWeek, CISA.gov, NISTIR 8259, Gartner Market Trends 2025, EnOcean Investor Report 2025, EU Cyber Resilience Act, Forescout Visibility Report 2025


