ID

VAR-201212-0248


CVE

CVE-2012-6428


TITLE

Carlo Gavazzi EOS-Box Vulnerabilities in obtaining administrative access rights in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2012-005791

DESCRIPTION

The Carlo Gavazzi EOS-Box stores hard-coded passwords in the PHP file of the device. By using the hard-coded passwords, attackers can log into the device with administrative privileges. This could allow the attacker to have unauthorized access. Carlo Gavazzi EOS-Box Contains multiple hard-coded accounts that allow users to gain administrative access. This vulnerability is CVE-2012-5862 Vulnerability similar to.By a third party, PHP By reading the password in the script, you may gain administrative access. Carlo Gavazzi EOS-Box is an embedded PC, and the CEOS-Box Photovoltaic Monitoring System is a photovoltaic monitoring system. EOS-Box is generally deployed in the renewable energy sector. Carlo Gavazzi EOS-BOX is prone to a security-bypass vulnerability because of hard coded passwords issue and an SQL-injection vulnerability. An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions with administrative privileges, access or modify data, or exploit latent vulnerabilities in the underlying database. Carlo Gavazzi EOS-BOX versions prior to 1.0.0.1080_2.1.10 are vulnerable. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Carlo Gavazzi Eos-Box Hard-Coded Credentials and SQL Injection SECUNIA ADVISORY ID: SA51641 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51641/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51641 RELEASE DATE: 2012-12-20 DISCUSS ADVISORY: http://secunia.com/advisories/51641/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/51641/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=51641 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A security issue and a vulnerability have been reported in Carlo Gavazzi Eos-Box, which can be exploited by malicious people conduct SQL injection attacks and compromise a vulnerable system. 2) Certain unspecified input is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The security issue and the vulnerability are reported in firmware versions prior to 1.0.0.1080_2.1.10. SOLUTION: Update to version 1.0.0.1080_2.1.10 (please contact the vendor for more information). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: ICS-CERT: http://www.us-cert.gov/control_systems/pdf/ICSA-12-354-02.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.7

sources: NVD: CVE-2012-6428 // JVNDB: JVNDB-2012-005791 // CNVD: CNVD-2012-7568 // BID: 56989 // VULHUB: VHN-59709 // VULMON: CVE-2012-6428 // PACKETSTORM: 118975

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-7568

AFFECTED PRODUCTS

vendor:carlosgavazzimodel:eos-box photovoltaic monitoring systemscope:lteversion:1.0.0

Trust: 1.0

vendor:carlosgavazzimodel:eos-box photovoltaic monitoring systemscope:eqversion: -

Trust: 1.0

vendor:carlo gavazzimodel:eos-boxscope: - version: -

Trust: 0.8

vendor:carlo gavazzimodel:eos-boxscope:ltversion:1.0.0.1080_2.1.10

Trust: 0.8

vendor:carlomodel:gavazzi eos-box 1.0.0.1080 2.1.10scope:ltversion: -

Trust: 0.6

vendor:carlosgavazzimodel:eos-box photovoltaic monitoring systemscope:eqversion:1.0.0

Trust: 0.6

sources: CNVD: CNVD-2012-7568 // JVNDB: JVNDB-2012-005791 // CNNVD: CNNVD-201212-277 // NVD: CVE-2012-6428

CVSS

SEVERITY

CVSSV2

CVSSV3

ics-cert@hq.dhs.gov: CVE-2012-6428
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2012-6428
value: HIGH

Trust: 1.0

NVD: CVE-2012-6428
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201212-277
value: CRITICAL

Trust: 0.6

VULHUB: VHN-59709
value: HIGH

Trust: 0.1

VULMON: CVE-2012-6428
value: HIGH

Trust: 0.1

ics-cert@hq.dhs.gov: CVE-2012-6428
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.9

VULHUB: VHN-59709
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-59709 // VULMON: CVE-2012-6428 // JVNDB: JVNDB-2012-005791 // CNNVD: CNNVD-201212-277 // NVD: CVE-2012-6428 // NVD: CVE-2012-6428

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.9

problemtype:CWE-798

Trust: 1.0

sources: VULHUB: VHN-59709 // JVNDB: JVNDB-2012-005791 // NVD: CVE-2012-6428

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201212-277

TYPE

trust management

Trust: 0.6

sources: CNNVD: CNNVD-201212-277

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-005791

PATCH

title:Top Pageurl:http://www.productselection.net/

Trust: 0.8

title:Carlo Gavazzi EOS-BOX administrator password to get a security bypass vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/26691

Trust: 0.6

sources: CNVD: CNVD-2012-7568 // JVNDB: JVNDB-2012-005791

EXTERNAL IDS

db:ICS CERTid:ICSA-12-354-02

Trust: 3.6

db:NVDid:CVE-2012-6428

Trust: 3.5

db:BIDid:56989

Trust: 0.9

db:SECUNIAid:51641

Trust: 0.8

db:JVNDBid:JVNDB-2012-005791

Trust: 0.8

db:CNNVDid:CNNVD-201212-277

Trust: 0.7

db:CNVDid:CNVD-2012-7568

Trust: 0.6

db:VULHUBid:VHN-59709

Trust: 0.1

db:VULMONid:CVE-2012-6428

Trust: 0.1

db:PACKETSTORMid:118975

Trust: 0.1

sources: CNVD: CNVD-2012-7568 // VULHUB: VHN-59709 // VULMON: CVE-2012-6428 // BID: 56989 // PACKETSTORM: 118975 // JVNDB: JVNDB-2012-005791 // CNNVD: CNNVD-201212-277 // NVD: CVE-2012-6428

REFERENCES

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-354-02.pdf

Trust: 3.6

url:https://www.cisa.gov/news-events/ics-advisories/icsa-12-354-02

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6428

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-6428

Trust: 0.8

url:http://secunia.com/advisories/51641

Trust: 0.6

url:http://www.securityfocus.com/bid/56989

Trust: 0.6

url:http://www.gavazzi-automation.com/pressdescr.asp?id=87

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/255.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://ics-cert.us-cert.gov/advisories/icsa-12-354-02

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51641

Trust: 0.1

url:http://secunia.com/advisories/51641/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/51641/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-7568 // VULHUB: VHN-59709 // VULMON: CVE-2012-6428 // BID: 56989 // PACKETSTORM: 118975 // JVNDB: JVNDB-2012-005791 // CNNVD: CNNVD-201212-277 // NVD: CVE-2012-6428

CREDITS

The vendor reported these issues.

Trust: 0.3

sources: BID: 56989

SOURCES

db:CNVDid:CNVD-2012-7568
db:VULHUBid:VHN-59709
db:VULMONid:CVE-2012-6428
db:BIDid:56989
db:PACKETSTORMid:118975
db:JVNDBid:JVNDB-2012-005791
db:CNNVDid:CNNVD-201212-277
db:NVDid:CVE-2012-6428

LAST UPDATE DATE

2025-07-02T23:53:34.083000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-7568date:2012-12-21T00:00:00
db:VULHUBid:VHN-59709date:2013-01-08T00:00:00
db:VULMONid:CVE-2012-6428date:2013-01-08T00:00:00
db:BIDid:56989date:2012-12-19T00:00:00
db:JVNDBid:JVNDB-2012-005791date:2012-12-25T00:00:00
db:CNNVDid:CNNVD-201212-277date:2012-12-24T00:00:00
db:NVDid:CVE-2012-6428date:2025-07-01T20:15:24.300

SOURCES RELEASE DATE

db:CNVDid:CNVD-2012-7568date:2012-12-21T00:00:00
db:VULHUBid:VHN-59709date:2012-12-23T00:00:00
db:VULMONid:CVE-2012-6428date:2012-12-23T00:00:00
db:BIDid:56989date:2012-12-19T00:00:00
db:PACKETSTORMid:118975date:2012-12-21T08:02:03
db:JVNDBid:JVNDB-2012-005791date:2012-12-25T00:00:00
db:CNNVDid:CNNVD-201212-277date:2012-12-21T00:00:00
db:NVDid:CVE-2012-6428date:2012-12-23T21:55:01.653