login.php on the Sinapsi eSolar Light Photovoltaic System Monitor (aka Schneider Electric Ezylog photovoltaic SCADA management server), Sinapsi eSolar, and Sinapsi eSolar DUO with firmware before 2.0.2870_2.2.12 establishes multiple hardcoded accounts, which makes it easier for remote attackers to obtain administrative access by leveraging a (1) cleartext password or (2) password hash contained in this script, as demonstrated by a password of astridservice or 36e44c9b64.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
http://www.exploit-db.com/exploits/21273/ | exploit |
http://archives.neohapsis.com/archives/bugtraq/2012-09/0045.html | mailing list exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/80200 | vdb entry |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-325-01.pdf | us government resource |
http://www.sinapsitech.it/default.asp?active_page_id=78&news_id=88 |