header-logo
Suggest Exploit
vendor:
pCOWeb
by:
Luca.Chiou
4.3
CVSS
MEDIUM
Unprotected Storage of Credentials
N/A
CWE
Product Name: pCOWeb
Affected Version From: All versions prior to B1.2.1
Affected Version To: B1.2.1
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Proprietary devices
2019

Carel pCOWeb – Unprotected Storage of Credentials

The devices, Carel pCOWeb, store plaintext passwords, which may allow sensitive information to be read by someone with access to the device. To exploit this vulnerability, an attacker can browse the maintain user page in website http://<Your Modem IP>/config/pw_changeusers.html and view the user's information which includes Description, Username and Password.

Mitigation:

The vendor has released a patch, B1.2.1, to address this vulnerability. Users should update their devices to the latest version.
Source

Exploit-DB raw data:

# Exploit Title: Carel pCOWeb - Unprotected Storage of Credentials
# Date: 2019-04-16
# Exploit Author: Luca.Chiou
# Vendor Homepage: https://www.carel.com/
# Version: Carel pCOWeb all versions prior to B1.2.1
# Tested on: It is a proprietary devices: http://www.carel.com/product/pcoweb-card

# 1. Description:
# The devices, Carel pCOWeb, store plaintext passwords,
# which may allow sensitive information to be read by someone with access to the device.

# 2. Proof of Concept:
# Browse the maintain user page in website:
# http://<Your<http://%3cYour> Modem IP>/config/pw_changeusers.html
# The user's information include Description, Username and Password.
# In user page, we can find out that user passwords stored in plaintext.