CVE-2022-28812: CWE-798 Use of Hard-coded Credentials in Carlo Gavazzi UWP 3.0 Monitoring Gateway and Controller
In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 a remote, unauthenticated attacker could make use of hard-coded credentials to gain SuperUser access to the device.
AI Analysis
Technical Summary
CVE-2022-28812 is a critical security vulnerability identified in Carlo Gavazzi's UWP 3.0 Monitoring Gateway and Controller, as well as the CPY Car Park Server version 2.8.3. The core issue stems from the use of hard-coded credentials embedded within the device firmware or software. These credentials are static and cannot be changed by the user, allowing a remote, unauthenticated attacker to leverage them to gain SuperUser (highest privilege) access to the affected devices. This vulnerability is classified under CWE-798, which highlights the risks associated with hard-coded passwords or cryptographic keys. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, indicating that exploitation requires no authentication, no user interaction, and can be performed remotely over the network with low complexity. Successful exploitation compromises confidentiality, integrity, and availability, as attackers can fully control the device, potentially leading to unauthorized data access, manipulation of device operations, or denial of service. The affected product, UWP 3.0 Monitoring Gateway and Controller, is typically used in industrial automation and building management systems, where it monitors and controls various environmental and operational parameters. The presence of hard-coded credentials in such critical infrastructure devices poses a significant security risk, as attackers could pivot into broader network environments or disrupt essential services. Although no known exploits have been reported in the wild to date, the vulnerability's severity and ease of exploitation make it a high-priority issue for organizations using these products. No official patches or remediation links were provided in the source information, indicating that affected organizations must seek vendor guidance or implement compensating controls promptly.
Potential Impact
For European organizations, the impact of CVE-2022-28812 could be substantial, especially for those in sectors relying on industrial automation, smart building management, or parking infrastructure where Carlo Gavazzi's UWP 3.0 devices are deployed. Compromise of these devices could lead to unauthorized access to sensitive operational data, manipulation of control systems, and potential disruption of critical services such as HVAC, lighting, or security systems. This could result in operational downtime, safety hazards, regulatory non-compliance, and reputational damage. Given the criticality of infrastructure in Europe and the increasing adoption of IoT and industrial control systems, exploitation of this vulnerability could also serve as a foothold for lateral movement within enterprise networks, increasing the risk of broader cyberattacks. The lack of authentication and remote exploitability further exacerbate the threat, making it accessible to a wide range of attackers, including nation-state actors or cybercriminal groups targeting European critical infrastructure or commercial facilities.
Mitigation Recommendations
1. Immediate Inventory and Identification: Organizations should identify all instances of Carlo Gavazzi UWP 3.0 Monitoring Gateway and Controller and CPY Car Park Server version 2.8.3 within their environment. 2. Vendor Engagement: Contact Carlo Gavazzi for official patches or firmware updates addressing CVE-2022-28812. If unavailable, request guidance on secure configuration or mitigation steps. 3. Network Segmentation: Isolate affected devices on dedicated network segments with strict access controls to limit exposure to untrusted networks and reduce the attack surface. 4. Access Control and Monitoring: Implement network-level authentication and monitoring to detect unauthorized access attempts. Use intrusion detection/prevention systems to flag anomalous activity targeting these devices. 5. Credential Management: Where possible, replace or disable hard-coded credentials. If the device firmware allows, change default passwords or disable remote management interfaces. 6. Compensating Controls: Employ firewall rules to restrict inbound traffic to management ports of these devices only to trusted administrative hosts. 7. Incident Response Preparedness: Develop and test incident response plans specific to industrial control system compromises, including containment and recovery procedures. 8. Continuous Monitoring: Regularly audit device logs and network traffic for signs of exploitation attempts or unauthorized access. 9. Consider Device Replacement: For environments where patching or mitigation is not feasible, plan for phased replacement of vulnerable devices with more secure alternatives.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden, Spain
CVE-2022-28812: CWE-798 Use of Hard-coded Credentials in Carlo Gavazzi UWP 3.0 Monitoring Gateway and Controller
Description
In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 a remote, unauthenticated attacker could make use of hard-coded credentials to gain SuperUser access to the device.
AI-Powered Analysis
Technical Analysis
CVE-2022-28812 is a critical security vulnerability identified in Carlo Gavazzi's UWP 3.0 Monitoring Gateway and Controller, as well as the CPY Car Park Server version 2.8.3. The core issue stems from the use of hard-coded credentials embedded within the device firmware or software. These credentials are static and cannot be changed by the user, allowing a remote, unauthenticated attacker to leverage them to gain SuperUser (highest privilege) access to the affected devices. This vulnerability is classified under CWE-798, which highlights the risks associated with hard-coded passwords or cryptographic keys. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, indicating that exploitation requires no authentication, no user interaction, and can be performed remotely over the network with low complexity. Successful exploitation compromises confidentiality, integrity, and availability, as attackers can fully control the device, potentially leading to unauthorized data access, manipulation of device operations, or denial of service. The affected product, UWP 3.0 Monitoring Gateway and Controller, is typically used in industrial automation and building management systems, where it monitors and controls various environmental and operational parameters. The presence of hard-coded credentials in such critical infrastructure devices poses a significant security risk, as attackers could pivot into broader network environments or disrupt essential services. Although no known exploits have been reported in the wild to date, the vulnerability's severity and ease of exploitation make it a high-priority issue for organizations using these products. No official patches or remediation links were provided in the source information, indicating that affected organizations must seek vendor guidance or implement compensating controls promptly.
Potential Impact
For European organizations, the impact of CVE-2022-28812 could be substantial, especially for those in sectors relying on industrial automation, smart building management, or parking infrastructure where Carlo Gavazzi's UWP 3.0 devices are deployed. Compromise of these devices could lead to unauthorized access to sensitive operational data, manipulation of control systems, and potential disruption of critical services such as HVAC, lighting, or security systems. This could result in operational downtime, safety hazards, regulatory non-compliance, and reputational damage. Given the criticality of infrastructure in Europe and the increasing adoption of IoT and industrial control systems, exploitation of this vulnerability could also serve as a foothold for lateral movement within enterprise networks, increasing the risk of broader cyberattacks. The lack of authentication and remote exploitability further exacerbate the threat, making it accessible to a wide range of attackers, including nation-state actors or cybercriminal groups targeting European critical infrastructure or commercial facilities.
Mitigation Recommendations
1. Immediate Inventory and Identification: Organizations should identify all instances of Carlo Gavazzi UWP 3.0 Monitoring Gateway and Controller and CPY Car Park Server version 2.8.3 within their environment. 2. Vendor Engagement: Contact Carlo Gavazzi for official patches or firmware updates addressing CVE-2022-28812. If unavailable, request guidance on secure configuration or mitigation steps. 3. Network Segmentation: Isolate affected devices on dedicated network segments with strict access controls to limit exposure to untrusted networks and reduce the attack surface. 4. Access Control and Monitoring: Implement network-level authentication and monitoring to detect unauthorized access attempts. Use intrusion detection/prevention systems to flag anomalous activity targeting these devices. 5. Credential Management: Where possible, replace or disable hard-coded credentials. If the device firmware allows, change default passwords or disable remote management interfaces. 6. Compensating Controls: Employ firewall rules to restrict inbound traffic to management ports of these devices only to trusted administrative hosts. 7. Incident Response Preparedness: Develop and test incident response plans specific to industrial control system compromises, including containment and recovery procedures. 8. Continuous Monitoring: Regularly audit device logs and network traffic for signs of exploitation attempts or unauthorized access. 9. Consider Device Replacement: For environments where patching or mitigation is not feasible, plan for phased replacement of vulnerable devices with more secure alternatives.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2022-04-08T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682ceb104d7c5ea9f4b39d6b
Added to database: 5/20/2025, 8:50:24 PM
Last enriched: 7/6/2025, 6:11:21 AM
Last updated: 7/31/2025, 4:52:00 AM
Views: 11
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.