CVE-2025-14295: CWE-257: Storing Passwords in a Recoverable Format in Automated Logic WebCTRL
Storing Passwords in a Recoverable Format vulnerability in Automated Logic WebCTRL on Windows, Carrier i-Vu on Windows. Storing Passwords in a Recoverable Format vulnerability (CWE-257) in the Web session management component allows an attacker to access stored passwords in a recoverable format which makes them subject to password reuse attacks by malicious users.This issue affects WebCTRL: from 6.0 through 9.0; i-Vu: from 6.0 through 9.0.
AI Analysis
Technical Summary
CVE-2025-14295 is a vulnerability classified under CWE-257, indicating improper storage of passwords in a recoverable format within Automated Logic's WebCTRL and Carrier's i-Vu building management systems running on Windows platforms. The affected versions range from 6.0 through 9.0. The flaw resides in the web session management component, where passwords are stored in a manner that allows them to be retrieved in plaintext by an attacker. This vulnerability does not require prior authentication but does require local access to the system, with a high attack complexity, meaning exploitation is non-trivial but feasible under certain conditions. The CVSS 4.0 score is 7.0 (high), reflecting significant confidentiality impact due to exposure of sensitive credentials, limited integrity impact, and no availability impact. The vulnerability enables attackers to perform password reuse attacks, potentially escalating privileges or moving laterally within the network. No known exploits are currently in the wild, and no patches have been linked yet, indicating the need for proactive mitigation. The vulnerability affects critical building management systems widely used in commercial and industrial environments, making it a significant concern for operational technology security.
Potential Impact
The primary impact of CVE-2025-14295 is the compromise of confidentiality through exposure of stored passwords in plaintext. For European organizations, especially those managing critical infrastructure such as commercial buildings, data centers, hospitals, and industrial facilities, this can lead to unauthorized access to building management systems. Attackers gaining access to these credentials could manipulate HVAC, security, and other operational controls, potentially causing physical disruptions or safety hazards. The vulnerability could also facilitate lateral movement within enterprise networks, increasing the risk of broader compromise. Given the high attack complexity and requirement for local access, the threat is more pronounced in environments with insufficient physical or network access controls. The lack of user interaction requirement means that once local access is obtained, exploitation can proceed without alerting users. This elevates the risk in multi-tenant buildings or facilities with shared access. The impact on integrity and availability is limited but should not be discounted as attackers could indirectly affect these through misuse of credentials.
Mitigation Recommendations
1. Immediately audit and replace all stored passwords within the affected WebCTRL and i-Vu systems to ensure compromised credentials are invalidated. 2. Restrict local access to systems running these products by enforcing strict physical security controls and network segmentation to limit exposure. 3. Implement multi-factor authentication (MFA) where possible to reduce the risk of credential misuse. 4. Monitor logs and access patterns for unusual activity indicative of credential theft or lateral movement. 5. Apply vendor patches or updates as soon as they become available; maintain close communication with Automated Logic and Carrier for official remediation. 6. Consider deploying endpoint detection and response (EDR) solutions on systems hosting these applications to detect suspicious local activity. 7. Educate staff on the risks of local system access and enforce least privilege principles. 8. If feasible, encrypt sensitive configuration files and stored credentials using strong cryptographic methods to prevent plaintext exposure. 9. Conduct regular security assessments and penetration testing focused on operational technology environments to identify and remediate similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands
CVE-2025-14295: CWE-257: Storing Passwords in a Recoverable Format in Automated Logic WebCTRL
Description
Storing Passwords in a Recoverable Format vulnerability in Automated Logic WebCTRL on Windows, Carrier i-Vu on Windows. Storing Passwords in a Recoverable Format vulnerability (CWE-257) in the Web session management component allows an attacker to access stored passwords in a recoverable format which makes them subject to password reuse attacks by malicious users.This issue affects WebCTRL: from 6.0 through 9.0; i-Vu: from 6.0 through 9.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-14295 is a vulnerability classified under CWE-257, indicating improper storage of passwords in a recoverable format within Automated Logic's WebCTRL and Carrier's i-Vu building management systems running on Windows platforms. The affected versions range from 6.0 through 9.0. The flaw resides in the web session management component, where passwords are stored in a manner that allows them to be retrieved in plaintext by an attacker. This vulnerability does not require prior authentication but does require local access to the system, with a high attack complexity, meaning exploitation is non-trivial but feasible under certain conditions. The CVSS 4.0 score is 7.0 (high), reflecting significant confidentiality impact due to exposure of sensitive credentials, limited integrity impact, and no availability impact. The vulnerability enables attackers to perform password reuse attacks, potentially escalating privileges or moving laterally within the network. No known exploits are currently in the wild, and no patches have been linked yet, indicating the need for proactive mitigation. The vulnerability affects critical building management systems widely used in commercial and industrial environments, making it a significant concern for operational technology security.
Potential Impact
The primary impact of CVE-2025-14295 is the compromise of confidentiality through exposure of stored passwords in plaintext. For European organizations, especially those managing critical infrastructure such as commercial buildings, data centers, hospitals, and industrial facilities, this can lead to unauthorized access to building management systems. Attackers gaining access to these credentials could manipulate HVAC, security, and other operational controls, potentially causing physical disruptions or safety hazards. The vulnerability could also facilitate lateral movement within enterprise networks, increasing the risk of broader compromise. Given the high attack complexity and requirement for local access, the threat is more pronounced in environments with insufficient physical or network access controls. The lack of user interaction requirement means that once local access is obtained, exploitation can proceed without alerting users. This elevates the risk in multi-tenant buildings or facilities with shared access. The impact on integrity and availability is limited but should not be discounted as attackers could indirectly affect these through misuse of credentials.
Mitigation Recommendations
1. Immediately audit and replace all stored passwords within the affected WebCTRL and i-Vu systems to ensure compromised credentials are invalidated. 2. Restrict local access to systems running these products by enforcing strict physical security controls and network segmentation to limit exposure. 3. Implement multi-factor authentication (MFA) where possible to reduce the risk of credential misuse. 4. Monitor logs and access patterns for unusual activity indicative of credential theft or lateral movement. 5. Apply vendor patches or updates as soon as they become available; maintain close communication with Automated Logic and Carrier for official remediation. 6. Consider deploying endpoint detection and response (EDR) solutions on systems hosting these applications to detect suspicious local activity. 7. Educate staff on the risks of local system access and enforce least privilege principles. 8. If feasible, encrypt sensitive configuration files and stored credentials using strong cryptographic methods to prevent plaintext exposure. 9. Conduct regular security assessments and penetration testing focused on operational technology environments to identify and remediate similar vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Carrier
- Date Reserved
- 2025-12-08T20:44:48.197Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 697220b84623b1157c6ff4bc
Added to database: 1/22/2026, 1:06:00 PM
Last enriched: 1/22/2026, 1:20:16 PM
Last updated: 2/5/2026, 3:56:12 PM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14150: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IBM webMethods Integration (on prem) - Integration Server
MediumCVE-2025-13491: CWE-426 Untrusted Search Path in IBM App Connect Operator
MediumCVE-2026-1927: CWE-862 Missing Authorization in wpsoul Greenshift – animation and page builder blocks
MediumCVE-2026-1523: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in PRIMION DIGITEK Digitek ADT1100
HighCVE-2025-13379: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in IBM Aspera Console
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.