These Sinapsi devices
store hard-coded passwords in the PHP file of the device. By using the
hard-coded passwords in the device, attackers can log into the device
with administrative privileges. This could allow the attacker to have
unauthorized access.
Advisories

No advisories yet.

Fixes

Solution

Sinapsi has developed a new firmware version 2.0.2870_2.2.12 that mitigates these vulnerabilities. Sinapsi released the new firmware on Monday, November 19, 2012 directly to the devices. Users will be able to manually download the firmware on their device by using the Firmware Update function in the System Menu in the device’s Web interface. Sinapsi has also posted a security newsletter to its public Web site http://www.sinapsitech.it/default.asp  .Other affected vendors have been notified by Sinapsi and ICS-CERT, but the availability of new firmware upgrades are unknown by ICS-CERT at this time.


Workaround

No workaround given by the vendor.

History

Tue, 08 Jul 2025 15:45:00 +0000

Type Values Removed Values Added
Description login.php on the Sinapsi eSolar Light Photovoltaic System Monitor (aka Schneider Electric Ezylog photovoltaic SCADA management server), Sinapsi eSolar, and Sinapsi eSolar DUO with firmware before 2.0.2870_2.2.12 establishes multiple hardcoded accounts, which makes it easier for remote attackers to obtain administrative access by leveraging a (1) cleartext password or (2) password hash contained in this script, as demonstrated by a password of astridservice or 36e44c9b64. These Sinapsi devices store hard-coded passwords in the PHP file of the device. By using the hard-coded passwords in the device, attackers can log into the device with administrative privileges. This could allow the attacker to have unauthorized access.
Title Sinapsi eSolar Hard-Coded Password
Weaknesses CWE-259
References

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-07-08T15:29:24.539Z

Reserved: 2012-11-14T00:00:00

Link: CVE-2012-5862

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-11-23T12:09:58.430

Modified: 2025-07-08T16:15:26.580

Link: CVE-2012-5862

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.