Ewon Flexy & Cosy131 – Feature Changes Introduced in Firmware 15.0

16 Jun 2025
This document outlines the key firmware changes introduced starting with firmware version 15.0.

APPLICABLE PRODUCTS

  • Ewon Flexy 205, 201, 202, 203, 101, 102, 103
  • Ewon Cosy 131
 

IN THIS ARTICLE

 

I. Introduction

To ensure system security, it is mandatory to update Ewon devices to the latest available firmware during installation.

Firmware version 15.0 has been specifically developed to comply with the new EU cyber-security requirements of the Radio Equipment Directive (RED), effective August 1, 2025.

In addition to firmware updates, you must:

  • Secure physical access to the Ewon device.
  • Restrict LAN connections to authorized users only.
  • Apply access rights levels on the Ewon device and in Talk2m to enforce the principle of least privilege.

These measures are essential to maintain the cyber-security integrity of your installation.

This document outlines the key firmware changes and highlights configuration impacts that may require adjustments during device setup. 

 

II. Overview of Feature Changes

A) FTP server

Changes:

  • Disabled by default
  • Available on VPN and LAN only. No longer available on WAN interfaces (Eth, Wifi or 4G)

Description:

The Ewon FTP server is now disabled by default (factory settings and after reset). 
It can be enabled on VPN and/or LAN interfaces via the advanced parameter ‘ClosedDevice’. 
Example values are provided; see (link) for details

Behavior ClosedDevice Value
FTP server is closed on all interfaces : LAN, WAN & VPN 21 (default)
FTP (& HTTP) server is opened on LAN & VPN 0
FTP server is closed on LAN, opened on VPN 1
FTP server is closed on VPN, opened on LAN 16

The parameter can be set using the Tabular edition feature, under Setup > System > Storage > Tabular edition > Edit COM cfg

 

       

B) NTP server

Changes:

  • Disabled by default

Description:

The Ewon NTP server is disabled by default. To use the Ewon as an NTP relay, the NTP server must be manually enabled in Setup > System > Main > Net Services > NTP server

 

 

 

C) USB over IP

Changes:

  • Disabled by default
  • Available on VPN; no longer available on WAN and LAN interfaces

Description:

USB over IP allows access to a USB device via a Talk2m connection, appearing locally in eCatcher. To use this feature, it must be manually enabled in Setup > System > Communication > General > USBIP

 

When enabling, the default Log Level and Start Port values can be kept.

 

Note: A shortcut to the USBIP setup page is available on the Summary page under the Gateway Status section.

 

D) HTTP server

Changes:

  • Available on VPN and LAN; no longer available on WAN interfaces

Description:

The Ewon HTTP server, used to display the web configuration pages, is no longer accessible via the WAN interface.

 

E) SMTP client

Changes:

  • SMTP client restricted to the VPN interface; no longer available on LAN or WAN (including WiFi and cellular)

Description:

The SMTP client, used to send email notifications, now works only through the VPN interface using the Talk2m mail relay.
Using a custom SMTP server is no longer supported.

 

F) Profinet Explorer

Changes:

  • Network scan starts only when the user clicks the Refresh button.

Description:

Previously, the Profinet Explorer started scanning automatically when the page was opened. Now, the scan must be manually triggered using the Refresh button.

Path: Setup > System > Main > Net services > Profinet Explorer

 

G) DynDNS

Changes:

  • No longer supported.

Description:

The DynDNS (dynamic DNS) feature has been removed from the Ewon device.

 

H) OPCUA Server 

Changes:

  • Password Strength Enforcement: Weak passwords are now automatically rejected.
  • Security Policy Defaults: insecure security policies 'None' and 'Basic256' are now disabled by default.
  • Warnings are displayed during configuration to promote usage of secure OPCUA

Description:

The OPC UA server’s resistance to brute force attacks was analysed and improved, particularly regarding password strength enforcement.

Weak passwords are now automatically rejected. When a weak password is entered, the system logs an error and displays a warning in the GUI. Only strong passwords will allow successful authentication. 
Password policy for the OPC UA server requires passwords to be between 12 and 30 characters long and include at least three of the following: 1 uppercase, 1 lowercase, 1 digit, 1 special character.

The insecure security policies 'None' and 'Basic256' are now disabled by default. If necessary, these policies can be manually re-enabled via the GUI or the config.txt file.

During OPCUA server configuration users now see warnings when configuring OPC UA client or server settings that are unencrypted or lack authentication.

 

 

 

I) Ethernet to serial gateways

Changes:

  • Disabled by default

Description:

The Ethernet to serial gateways are now disabled by default (factory settings and after reset). 
Each serial gateway can be enabled under the Global Settings of the IOServer config: Tags > IO Servers > General > Global Settings

 

J) Serial over IP (VCOM)

Changes:

  • Available on VPN and LAN; no longer available on WAN interface.

Description:

Serial over IP allows access to a serial device via a Talk2m connection. 
 

K) PSTN configuration

Changes:

  • Incoming PSTN connections no longer supported.

Description:

The PSTN incoming connection (landline connections) is not anymore supported. Outgoing PSTN connection is still possible.

The linked Callback feature and Transparent Forwarding has also been removed.
 

 

III. Reinforced Logging and Traceability

Authentication Logs:

The Ewon device now logs successful and failed login attempts across all its various configuration interfaces (Web server, EBD, FTP server, etc.)

Example EventLog messages: 

Time Event Description Originator
15/06/2025 23:10 -21305 eftp-Open FTP session (User: Adm) Ftps
15/06/2025 23:13 -28611 secu-Authentication failure (From FTP server) ftps
15/06/2025 22:51 -28611 secu-Authentication failure (From WEB server) http
15/06/2025 22:51 -21020 east-User has logged into the device web interface (adm) http

 

Privacy asset usage logs:

Logging has been added to track the configuration and usage of privacy assets (e.g., email and SMS). The log records when values are configured and when they are used.

Example EventLog messages:

Time Event Description Originator
15/06/2025  22:22 1073788325 cfgw-The COM configuration has been modified http
15/06/2025  22:23 -34559 ecfg-Default Admin password has been changed http
       
       

 

Privacy Asset Log (PAL) buffer

A persistent Privacy Asset Log (PAL) has been implemented to comply with RED requirements, ensuring Privacy Asset Event logs are retained after a reboot.

A new Export Block descriptor (EBD), dtPAL, allows downloading all log entries in a single file without deleting them.

EBD syntax Example: http://#deviceIP#/rcgi.bin/ParamForm?AST_Param=$dtPAL$fnLogText.txt
 

Note: The PAL stores events in three rotating log files located in /usr/PALog/, each up to 0.3 MB. Older files are automatically deleted to maintain storage limits.

 

IV. System and Workflow Changes You May Need to Make

Device configuration via FTP

The FTP server is disabled by default and needs to be enabled first via the GUI (tabular editor). If enabled on the LAN interface, it needs to be disabled after use unless physical and LAN access are secured. 
Alternatively, configuration via USB stick can be used.
 

Backup / Restore (eBuddy)

Backup and restore via eBuddy use the FTP server, which needs to be enabled first through the GUI. If enabled on the LAN interface, the FTP server needs to be disabled after use unless physical and LAN access are secured. 
 

Remote Access to USB Devices 

As the USB over IP feature is disabled by default, you must first enable it on the Ewon device before you can remotely access the connected USB device. 
A shortcut to the USB over IP setup page is available on the Cosy+ summary page, under the Gateway Status section. 

 

OPCUA Server

If you (or a local service) connect to the OPC UA server using the Username/Password login type, make sure you are using a user account with a strong password. Starting from firmware version 15.0, the OPC UA server rejects connections that use weak passwords. You may need to create a user with a sufficiently strong password to connect successfully.

 

Remote access to serial devices 

Since the Ethernet-to-Serial gateways are disabled by default, you must first enable them on the Ewon device before you can remotely access the connected serial PLC or device.