Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1693: CWE-1390 Weak Authentication in arcinfo PcVue

0
Medium
VulnerabilityCVE-2026-1693cvecve-2026-1693cwe-1390cwe-477
Published: Thu Feb 26 2026 (02/26/2026, 07:56:10 UTC)
Source: CVE Database V5
Vendor/Project: arcinfo
Product: PcVue

Description

The OAuth grant type Resource Owner Password Credentials (ROPC) flow is still used by the werbservices used by the WebVue, WebScheduler, TouchVue and Snapvue features of PcVue in version 12.0.0 through 16.3.3 included despite being deprecated. It might allow a remote attacker to steal user credentials.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 18:43:25 UTC

Technical Analysis

CVE-2026-1693 identifies a security weakness in arcinfo's PcVue software, specifically versions 12.0.0 through 16.3.3, where the OAuth Resource Owner Password Credentials (ROPC) grant type is still utilized by web services supporting the WebVue, WebScheduler, TouchVue, and Snapvue features. The ROPC flow is deprecated because it requires users to provide their credentials directly to the client application, increasing the risk of credential exposure. In this case, the web services continue to accept ROPC authentication, which can be exploited by remote attackers to intercept or steal user credentials. The vulnerability does not require the attacker to have privileges or prior authentication but does require user interaction, such as tricking users into authenticating via the vulnerable flow. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction required, and low confidentiality impact. The weakness is categorized under CWE-1390 (Weak Authentication) and CWE-477 (Use of Obsolete or Deprecated Function). No patches or exploit code are currently available, but the risk remains due to the inherent insecurity of ROPC. The affected PcVue versions are widely used in industrial automation and building management systems, which rely on secure authentication to protect operational technology environments.

Potential Impact

The primary impact of this vulnerability is the potential compromise of user credentials, which can lead to unauthorized access to PcVue management interfaces and associated systems. Credential theft can facilitate further attacks, including privilege escalation, data exfiltration, and disruption of critical industrial or building automation processes. Since PcVue is used globally in sectors such as energy, manufacturing, and infrastructure, exploitation could result in operational downtime, safety risks, and financial losses. The vulnerability's exploitation does not require prior access or privileges, increasing the attack surface. However, the need for user interaction somewhat limits automated exploitation. The confidentiality of user credentials is at risk, while integrity and availability impacts are indirect but possible if attackers leverage stolen credentials to manipulate system configurations or disrupt services.

Mitigation Recommendations

Organizations should immediately assess their PcVue deployments to identify affected versions (12.0.0 through 16.3.3) and disable or restrict the use of the OAuth Resource Owner Password Credentials (ROPC) grant type in web services. Where possible, update PcVue to versions that have removed or replaced ROPC with more secure OAuth flows such as Authorization Code or Client Credentials grants. Implement multi-factor authentication (MFA) to reduce the risk of credential compromise. Monitor authentication logs for unusual access patterns or failed login attempts indicative of exploitation attempts. Educate users about phishing and social engineering risks that could lead to credential disclosure. Network segmentation and strict access controls should be enforced around PcVue management interfaces to limit exposure. If patches become available, apply them promptly. Additionally, consider deploying web application firewalls (WAFs) to detect and block suspicious authentication requests exploiting this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
arcinfo
Date Reserved
2026-01-30T08:37:34.459Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a00034b7ef31ef0bd4068f

Added to database: 2/26/2026, 8:11:32 AM

Last enriched: 3/26/2026, 6:43:25 PM

Last updated: 4/11/2026, 6:10:12 PM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses