Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14295: CWE-257: Storing Passwords in a Recoverable Format in Automated Logic WebCTRL

0
High
VulnerabilityCVE-2025-14295cvecve-2025-14295cwe-257
Published: Thu Jan 22 2026 (01/22/2026, 12:52:14 UTC)
Source: CVE Database V5
Vendor/Project: Automated Logic
Product: WebCTRL

Description

Storing Passwords in a Recoverable Format vulnerability in Automated Logic WebCTRL on Windows, Carrier i-Vu on Windows. Storing Passwords in a Recoverable Format vulnerability (CWE-257) in the Web session management component allows an attacker to access stored passwords in a recoverable format which makes them subject to password reuse attacks by malicious users.This issue affects WebCTRL: from 6.0 through 9.0; i-Vu: from 6.0 through 9.0.

AI-Powered Analysis

AILast updated: 01/22/2026, 13:20:16 UTC

Technical Analysis

CVE-2025-14295 is a vulnerability classified under CWE-257, indicating improper storage of passwords in a recoverable format within Automated Logic's WebCTRL and Carrier's i-Vu building management systems running on Windows platforms. The affected versions range from 6.0 through 9.0. The flaw resides in the web session management component, where passwords are stored in a manner that allows them to be retrieved in plaintext by an attacker. This vulnerability does not require prior authentication but does require local access to the system, with a high attack complexity, meaning exploitation is non-trivial but feasible under certain conditions. The CVSS 4.0 score is 7.0 (high), reflecting significant confidentiality impact due to exposure of sensitive credentials, limited integrity impact, and no availability impact. The vulnerability enables attackers to perform password reuse attacks, potentially escalating privileges or moving laterally within the network. No known exploits are currently in the wild, and no patches have been linked yet, indicating the need for proactive mitigation. The vulnerability affects critical building management systems widely used in commercial and industrial environments, making it a significant concern for operational technology security.

Potential Impact

The primary impact of CVE-2025-14295 is the compromise of confidentiality through exposure of stored passwords in plaintext. For European organizations, especially those managing critical infrastructure such as commercial buildings, data centers, hospitals, and industrial facilities, this can lead to unauthorized access to building management systems. Attackers gaining access to these credentials could manipulate HVAC, security, and other operational controls, potentially causing physical disruptions or safety hazards. The vulnerability could also facilitate lateral movement within enterprise networks, increasing the risk of broader compromise. Given the high attack complexity and requirement for local access, the threat is more pronounced in environments with insufficient physical or network access controls. The lack of user interaction requirement means that once local access is obtained, exploitation can proceed without alerting users. This elevates the risk in multi-tenant buildings or facilities with shared access. The impact on integrity and availability is limited but should not be discounted as attackers could indirectly affect these through misuse of credentials.

Mitigation Recommendations

1. Immediately audit and replace all stored passwords within the affected WebCTRL and i-Vu systems to ensure compromised credentials are invalidated. 2. Restrict local access to systems running these products by enforcing strict physical security controls and network segmentation to limit exposure. 3. Implement multi-factor authentication (MFA) where possible to reduce the risk of credential misuse. 4. Monitor logs and access patterns for unusual activity indicative of credential theft or lateral movement. 5. Apply vendor patches or updates as soon as they become available; maintain close communication with Automated Logic and Carrier for official remediation. 6. Consider deploying endpoint detection and response (EDR) solutions on systems hosting these applications to detect suspicious local activity. 7. Educate staff on the risks of local system access and enforce least privilege principles. 8. If feasible, encrypt sensitive configuration files and stored credentials using strong cryptographic methods to prevent plaintext exposure. 9. Conduct regular security assessments and penetration testing focused on operational technology environments to identify and remediate similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Carrier
Date Reserved
2025-12-08T20:44:48.197Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697220b84623b1157c6ff4bc

Added to database: 1/22/2026, 1:06:00 PM

Last enriched: 1/22/2026, 1:20:16 PM

Last updated: 2/5/2026, 3:56:12 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats