Impact
The vulnerability arises from the continued use of the OAuth Resource Owner Password Credentials (ROPC) grant type in PcVue’s web services, which has been deprecated. An attacker that can reach these web services may abuse the ROPC flow to obtain usernames and passwords for target accounts, leading to credential compromise. This weakness is represented by CWE-1390 and CWE-477.
Affected Systems
The issue affects PcVue products sold by ArcInfo, specifically the WebVue, WebScheduler, TouchVue and Snapvue components configured with WebServer in versions 12.0.0 through 16.3.3. Firmware or control system updates are available for PcVue 15.2.14 and 16.3.4 that remove the vulnerable flow.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate impact. EPSS is below 1%, suggesting the likelihood of exploitation is low for now, and the vulnerability is not listed in the CISA KEV catalog. An attacker would require network exposure to the Web services, typically through the Internet or an insecure internal network, to trigger the ROPC flow. The official guidance therefore recommends immediate patching and disabling of the flow when possible.
OpenCVE Enrichment