Cumulative Update 5


This section introduces the new features and enhancement in EnOS 2.3 CU5.

Core

IAM


New Feature/Enhancement/Issue Feature/Enhancement/Fix Description Impact (if any)
Security fixes:
  • CVE-2022-22965
  • CVE-2022-22978
  • CVE-2016-1000027
Fixed None

IoT Hub

Device Connectivity & Management Service


New Feature/Enhancement/Issue Feature/Enhancement/Fix Description Impact (if any)
When you register a sub-device under a gateway device and use the device simulator to simulate the connection of the sub-device, the asset ID of the sub-device obtained in the logs may be incorrectly displayed as the asset ID of the gateway device instead. Fixed. The asset ID of the sub-device is now correctly displayed in the logs. None
When the certificate issued by EnOS for the MQTT server expires, you need to contact the system administrator to renew the certificate. Fixed. The certificate will be automatically renewed when it expires. None

Device Integration Service


New Feature/Enhancement/Issue Feature/Enhancement/Fix Description Impact (if any)
A flow that contains a Store Context node may not run stably for a long period of time. Fixed None
A flow that contains an HTTP Server node may not run stably for a long period of time. Fixed None
When you select Uni-directional or Bi-directional as the authentication method in the MQTT Sub node, the flow may fail to be published. Fixed None
The Multicast node may generate duplicate route elements when forwarding messages to downstream nodes, resulting in conflicts in the message routing process and the failure to publish the flow. Fixed None

Alert Management


New Feature/Enhancement/Issue Feature/Enhancement/Fix Description Impact (if any)
New Feature If an alert rule contains multiple measurement points, you can now specify the interval for generating alert records. Only the last triggered alert in each interval generates an alert record. None

Enterprise Data Platform

Stream Processing


New Feature/Enhancement/Issue Feature/Enhancement/Fix Description Impact (if any)
Security fixes:
  • CVE-2016-1000027
  • CVE-2020-5413
  • CVE-2022-22965
Fixed None