ID

VAR-201212-0247


CVE

CVE-2012-6427


TITLE

Carlo Gavazzi EOS-BOX SQL Injection Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2012-7569 // CNNVD: CNNVD-201212-278

DESCRIPTION

The Carlo Gavazzi EOS-Box does not check the validity of the data before executing queries. By accessing the SQL table of certain pages that do not require authentication, attackers can leak information from the device. This could allow the attacker to compromise confidentiality. Carlo Gavazzi EOS-Box The firmware of SQL An injection vulnerability exists. This vulnerability CVE-2012-5861 Vulnerability similar to.By any third party SQL The command may be executed. Carlo Gavazzi EOS-Box is an embedded PC, and the CEOS-Box Photovoltaic Monitoring System is a photovoltaic monitoring system. EOS-Box is generally deployed in the renewable energy sector. Allow unauthorized attackers to exploit vulnerabilities to obtain device-sensitive information. Carlo Gavazzi EOS-BOX is prone to a security-bypass vulnerability because of hard coded passwords issue and an SQL-injection vulnerability. An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions with administrative privileges, access or modify data, or exploit latent vulnerabilities in the underlying database. Carlo Gavazzi EOS-BOX versions prior to 1.0.0.1080_2.1.10 are vulnerable. Through an unknown vector, a remote attacker can exploit this vulnerability to execute arbitrary SQL commands. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Carlo Gavazzi Eos-Box Hard-Coded Credentials and SQL Injection SECUNIA ADVISORY ID: SA51641 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51641/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51641 RELEASE DATE: 2012-12-20 DISCUSS ADVISORY: http://secunia.com/advisories/51641/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/51641/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=51641 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A security issue and a vulnerability have been reported in Carlo Gavazzi Eos-Box, which can be exploited by malicious people conduct SQL injection attacks and compromise a vulnerable system. 1) The security issue is caused due to the application using hard-coded credentials, which may allow full administrative access to the system. 2) Certain unspecified input is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The security issue and the vulnerability are reported in firmware versions prior to 1.0.0.1080_2.1.10. SOLUTION: Update to version 1.0.0.1080_2.1.10 (please contact the vendor for more information). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-12-354-02.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2012-6427 // JVNDB: JVNDB-2012-005790 // CNVD: CNVD-2012-7569 // BID: 56989 // VULHUB: VHN-59708 // PACKETSTORM: 118975

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-7569

AFFECTED PRODUCTS

vendor:carlosgavazzimodel:eos-box photovoltaic monitoring systemscope:lteversion:1.0.0

Trust: 1.0

vendor:carlosgavazzimodel:eos-box photovoltaic monitoring systemscope:eqversion: -

Trust: 1.0

vendor:carlo gavazzimodel:eos-boxscope: - version: -

Trust: 0.8

vendor:carlo gavazzimodel:eos-boxscope:ltversion:1.0.0.1080_2.1.10

Trust: 0.8

vendor:carlomodel:gavazzi eos-box 1.0.0.1080 2.1.10scope:ltversion: -

Trust: 0.6

vendor:carlosgavazzimodel:eos-box photovoltaic monitoring systemscope:eqversion:1.0.0

Trust: 0.6

sources: CNVD: CNVD-2012-7569 // JVNDB: JVNDB-2012-005790 // CNNVD: CNNVD-201212-278 // NVD: CVE-2012-6427

CVSS

SEVERITY

CVSSV2

CVSSV3

ics-cert@hq.dhs.gov: CVE-2012-6427
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2012-6427
value: HIGH

Trust: 1.0

NVD: CVE-2012-6427
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201212-278
value: HIGH

Trust: 0.6

VULHUB: VHN-59708
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-6427
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ics-cert@hq.dhs.gov: CVE-2012-6427
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-59708
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-59708 // JVNDB: JVNDB-2012-005790 // CNNVD: CNNVD-201212-278 // NVD: CVE-2012-6427 // NVD: CVE-2012-6427

PROBLEMTYPE DATA

problemtype:CWE-89

Trust: 1.9

sources: VULHUB: VHN-59708 // JVNDB: JVNDB-2012-005790 // NVD: CVE-2012-6427

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201212-278

TYPE

sql injection

Trust: 0.7

sources: PACKETSTORM: 118975 // CNNVD: CNNVD-201212-278

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-005790

PATCH

title:Top Pageurl:http://www.productselection.net/

Trust: 0.8

title:Carlo Gavazzi EOS-BOX SQL Injection Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/26693

Trust: 0.6

sources: CNVD: CNVD-2012-7569 // JVNDB: JVNDB-2012-005790

EXTERNAL IDS

db:ICS CERTid:ICSA-12-354-02

Trust: 3.5

db:NVDid:CVE-2012-6427

Trust: 3.4

db:BIDid:56989

Trust: 0.9

db:SECUNIAid:51641

Trust: 0.8

db:JVNDBid:JVNDB-2012-005790

Trust: 0.8

db:CNNVDid:CNNVD-201212-278

Trust: 0.7

db:CNVDid:CNVD-2012-7569

Trust: 0.6

db:VULHUBid:VHN-59708

Trust: 0.1

db:PACKETSTORMid:118975

Trust: 0.1

sources: CNVD: CNVD-2012-7569 // VULHUB: VHN-59708 // BID: 56989 // PACKETSTORM: 118975 // JVNDB: JVNDB-2012-005790 // CNNVD: CNNVD-201212-278 // NVD: CVE-2012-6427

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-354-02.pdf

Trust: 3.5

url:https://www.cisa.gov/news-events/ics-advisories/icsa-12-354-02

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6427

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-6427

Trust: 0.8

url:http://secunia.com/advisories/51641

Trust: 0.6

url:http://www.securityfocus.com/bid/56989

Trust: 0.6

url:http://www.gavazzi-automation.com/pressdescr.asp?id=87

Trust: 0.3

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51641

Trust: 0.1

url:http://secunia.com/advisories/51641/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/51641/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-7569 // VULHUB: VHN-59708 // BID: 56989 // PACKETSTORM: 118975 // JVNDB: JVNDB-2012-005790 // CNNVD: CNNVD-201212-278 // NVD: CVE-2012-6427

CREDITS

The vendor reported these issues.

Trust: 0.3

sources: BID: 56989

SOURCES

db:CNVDid:CNVD-2012-7569
db:VULHUBid:VHN-59708
db:BIDid:56989
db:PACKETSTORMid:118975
db:JVNDBid:JVNDB-2012-005790
db:CNNVDid:CNNVD-201212-278
db:NVDid:CVE-2012-6427

LAST UPDATE DATE

2025-07-02T23:53:34.125000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-7569date:2012-12-21T00:00:00
db:VULHUBid:VHN-59708date:2012-12-24T00:00:00
db:BIDid:56989date:2012-12-19T00:00:00
db:JVNDBid:JVNDB-2012-005790date:2012-12-25T00:00:00
db:CNNVDid:CNNVD-201212-278date:2012-12-24T00:00:00
db:NVDid:CVE-2012-6427date:2025-07-01T20:15:24.093

SOURCES RELEASE DATE

db:CNVDid:CNVD-2012-7569date:2012-12-21T00:00:00
db:VULHUBid:VHN-59708date:2012-12-23T00:00:00
db:BIDid:56989date:2012-12-19T00:00:00
db:PACKETSTORMid:118975date:2012-12-21T08:02:03
db:JVNDBid:JVNDB-2012-005790date:2012-12-25T00:00:00
db:CNNVDid:CNNVD-201212-278date:2012-12-21T00:00:00
db:NVDid:CVE-2012-6427date:2012-12-23T21:55:01.547