The Carlo Gavazzi
EOS-Box

stores hard-coded passwords in the PHP file of
the device. By using the hard-coded passwords, attackers can log into
the device with administrative privileges. This could allow the attacker
to have unauthorized access.
Advisories
Source ID Title
EUVD EUVD EUVD-2012-6283 The Carlo Gavazzi EOS-Box stores hard-coded passwords in the PHP file of the device. By using the hard-coded passwords, attackers can log into the device with administrative privileges. This could allow the attacker to have unauthorized access.
Fixes

Solution

Carlo Gavazzi has developed a new firmware Version 1.0.0.1080_2.1.10 that mitigates these vulnerabilities. Carlo Gavazzi released the new firmware Tuesday, December 18, 2012, directly to the devices. Users will be able to manually download the firmware on their device by using the Firmware Update function in the System Menu in the device’s Web interface.


Workaround

No workaround given by the vendor.

History

Tue, 01 Jul 2025 20:15:00 +0000

Type Values Removed Values Added
Description Carlo Gavazzi EOS-Box with firmware before 1.0.0.1080_2.1.10 establishes multiple hardcoded accounts, which makes it easier for remote attackers to obtain administrative access by reading a password in a PHP script, a similar issue to CVE-2012-5862. The Carlo Gavazzi EOS-Box stores hard-coded passwords in the PHP file of the device. By using the hard-coded passwords, attackers can log into the device with administrative privileges. This could allow the attacker to have unauthorized access.
Title Carlo Gavazzi EOS Box Hard-Coded Credentials
Weaknesses CWE-798
References

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-07-01T19:59:06.114Z

Reserved: 2012-12-18T00:00:00Z

Link: CVE-2012-6428

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-12-23T21:55:01.653

Modified: 2025-07-01T20:15:24.300

Link: CVE-2012-6428

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.