Skip to main content

CVE-2022-28812: CWE-798 Use of Hard-coded Credentials in Carlo Gavazzi UWP 3.0 Monitoring Gateway and Controller

Critical
VulnerabilityCVE-2022-28812cvecve-2022-28812cwe-798
Published: Wed Sep 28 2022 (09/28/2022, 13:45:33 UTC)
Source: CVE
Vendor/Project: Carlo Gavazzi
Product: UWP 3.0 Monitoring Gateway and Controller

Description

In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 a remote, unauthenticated attacker could make use of hard-coded credentials to gain SuperUser access to the device.

AI-Powered Analysis

AILast updated: 07/06/2025, 06:11:21 UTC

Technical Analysis

CVE-2022-28812 is a critical security vulnerability identified in Carlo Gavazzi's UWP 3.0 Monitoring Gateway and Controller, as well as the CPY Car Park Server version 2.8.3. The core issue stems from the use of hard-coded credentials embedded within the device firmware or software. These credentials are static and cannot be changed by the user, allowing a remote, unauthenticated attacker to leverage them to gain SuperUser (highest privilege) access to the affected devices. This vulnerability is classified under CWE-798, which highlights the risks associated with hard-coded passwords or cryptographic keys. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, indicating that exploitation requires no authentication, no user interaction, and can be performed remotely over the network with low complexity. Successful exploitation compromises confidentiality, integrity, and availability, as attackers can fully control the device, potentially leading to unauthorized data access, manipulation of device operations, or denial of service. The affected product, UWP 3.0 Monitoring Gateway and Controller, is typically used in industrial automation and building management systems, where it monitors and controls various environmental and operational parameters. The presence of hard-coded credentials in such critical infrastructure devices poses a significant security risk, as attackers could pivot into broader network environments or disrupt essential services. Although no known exploits have been reported in the wild to date, the vulnerability's severity and ease of exploitation make it a high-priority issue for organizations using these products. No official patches or remediation links were provided in the source information, indicating that affected organizations must seek vendor guidance or implement compensating controls promptly.

Potential Impact

For European organizations, the impact of CVE-2022-28812 could be substantial, especially for those in sectors relying on industrial automation, smart building management, or parking infrastructure where Carlo Gavazzi's UWP 3.0 devices are deployed. Compromise of these devices could lead to unauthorized access to sensitive operational data, manipulation of control systems, and potential disruption of critical services such as HVAC, lighting, or security systems. This could result in operational downtime, safety hazards, regulatory non-compliance, and reputational damage. Given the criticality of infrastructure in Europe and the increasing adoption of IoT and industrial control systems, exploitation of this vulnerability could also serve as a foothold for lateral movement within enterprise networks, increasing the risk of broader cyberattacks. The lack of authentication and remote exploitability further exacerbate the threat, making it accessible to a wide range of attackers, including nation-state actors or cybercriminal groups targeting European critical infrastructure or commercial facilities.

Mitigation Recommendations

1. Immediate Inventory and Identification: Organizations should identify all instances of Carlo Gavazzi UWP 3.0 Monitoring Gateway and Controller and CPY Car Park Server version 2.8.3 within their environment. 2. Vendor Engagement: Contact Carlo Gavazzi for official patches or firmware updates addressing CVE-2022-28812. If unavailable, request guidance on secure configuration or mitigation steps. 3. Network Segmentation: Isolate affected devices on dedicated network segments with strict access controls to limit exposure to untrusted networks and reduce the attack surface. 4. Access Control and Monitoring: Implement network-level authentication and monitoring to detect unauthorized access attempts. Use intrusion detection/prevention systems to flag anomalous activity targeting these devices. 5. Credential Management: Where possible, replace or disable hard-coded credentials. If the device firmware allows, change default passwords or disable remote management interfaces. 6. Compensating Controls: Employ firewall rules to restrict inbound traffic to management ports of these devices only to trusted administrative hosts. 7. Incident Response Preparedness: Develop and test incident response plans specific to industrial control system compromises, including containment and recovery procedures. 8. Continuous Monitoring: Regularly audit device logs and network traffic for signs of exploitation attempts or unauthorized access. 9. Consider Device Replacement: For environments where patching or mitigation is not feasible, plan for phased replacement of vulnerable devices with more secure alternatives.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2022-04-08T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682ceb104d7c5ea9f4b39d6b

Added to database: 5/20/2025, 8:50:24 PM

Last enriched: 7/6/2025, 6:11:21 AM

Last updated: 7/31/2025, 4:52:00 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats