Skip to main content

CVE-2022-22523: CWE-287 Improper Authentication in Carlo Gavazzi UWP 3.0 Monitoring Gateway and Controller

High
VulnerabilityCVE-2022-22523cvecve-2022-22523cwe-287
Published: Wed Sep 28 2022 (09/28/2022, 13:45:29 UTC)
Source: CVE
Vendor/Project: Carlo Gavazzi
Product: UWP 3.0 Monitoring Gateway and Controller

Description

An improper authentication vulnerability exists in the Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 Web-App which allows an authentication bypass to the context of an unauthorised user if free-access is disabled.

AI-Powered Analysis

AILast updated: 07/07/2025, 14:58:55 UTC

Technical Analysis

CVE-2022-22523 is a high-severity improper authentication vulnerability (CWE-287) affecting Carlo Gavazzi's UWP 3.0 Monitoring Gateway and Controller, as well as the CPY Car Park Server Web-App version 2.8.3. The vulnerability allows an attacker to bypass authentication controls when the 'free-access' setting is disabled, enabling unauthorized access to the system's context without credentials or user interaction. The issue stems from inadequate enforcement of authentication mechanisms, permitting attackers to gain access remotely over the network (AV:N) with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability. The affected product is used in industrial monitoring and control environments, where unauthorized access could expose sensitive operational data or allow attackers to gather intelligence for further attacks. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk if weaponized. The lack of available patches at the time of reporting increases the urgency for mitigation and monitoring.

Potential Impact

For European organizations, especially those in industrial automation, building management, and infrastructure sectors using Carlo Gavazzi's UWP 3.0 Monitoring Gateway and Controller, this vulnerability poses a substantial risk. Unauthorized access could lead to exposure of sensitive operational data, potentially compromising confidentiality of industrial processes or facility management information. While the vulnerability does not directly enable system manipulation or denial of service, the unauthorized access could serve as a foothold for lateral movement or reconnaissance by threat actors. This is particularly concerning for critical infrastructure operators and manufacturing facilities in Europe that rely on these systems for monitoring and control. The breach of confidentiality could also lead to regulatory compliance issues under GDPR if personal or sensitive data is exposed. The absence of known exploits reduces immediate risk but does not eliminate the threat, as motivated attackers could develop exploits given the vulnerability's low complexity and no authentication requirement.

Mitigation Recommendations

European organizations using Carlo Gavazzi UWP 3.0 Monitoring Gateway and Controller should immediately review and verify their device configurations, especially the 'free-access' setting, ensuring it is appropriately managed. Network segmentation should be enforced to isolate these devices from general enterprise networks and restrict access to trusted administrators only. Implement strict firewall rules to limit inbound traffic to the minimum necessary, ideally restricting access to management interfaces to internal networks or VPNs. Continuous monitoring and logging of access attempts to these devices should be enabled to detect unauthorized access early. Organizations should engage with Carlo Gavazzi for updates or patches and apply them promptly once available. Additionally, consider deploying intrusion detection systems (IDS) tuned to detect anomalous authentication bypass attempts targeting these devices. As a longer-term measure, evaluate alternative solutions or additional authentication layers (e.g., multifactor authentication) if supported by the product to mitigate future risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2022-01-03T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682de8d1c4522896dcc00423

Added to database: 5/21/2025, 2:53:05 PM

Last enriched: 7/7/2025, 2:58:55 PM

Last updated: 8/14/2025, 3:50:19 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats