Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue

0
Low
VulnerabilityCVE-2026-1694cvecve-2026-1694cwe-201
Published: Thu Feb 26 2026 (02/26/2026, 07:56:57 UTC)
Source: CVE Database V5
Vendor/Project: arcinfo
Product: PcVue

Description

HTTP headers are added by the default configuration of IIS and ASP.net, and are not removed at the deployment phase of the webservices used by the WebVue, WebScheduler, TouchVue and SnapVue features of PcVue in version 12.0.0 through 16.3.3 included. It unnecessarily exposes sensitive information about the server configuration.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 18:43:40 UTC

Technical Analysis

CVE-2026-1694 is a vulnerability classified under CWE-201 (Insertion of Sensitive Information into Sent Data) affecting arcinfo's PcVue software versions 12.0.0 through 16.3.3. The issue arises because the default configuration of IIS and ASP.net web servers adds HTTP headers that disclose sensitive server configuration details. These headers are not removed during the deployment phase of web services used by PcVue features including WebVue, WebScheduler, TouchVue, and SnapVue. As a result, HTTP responses from these services leak information such as server version, technology stack details, or other configuration metadata that could assist attackers in crafting targeted attacks or identifying exploitable components. The vulnerability has a CVSS 4.0 base score of 2.3, indicating low severity. The attack vector is network-based with no privileges required, but it demands user interaction and has high attack complexity, limiting exploitability. No known public exploits or active exploitation have been reported. This vulnerability primarily affects the confidentiality aspect by exposing sensitive information but does not directly impact integrity or availability. The affected PcVue versions are commonly used in industrial automation and control systems, where information disclosure can aid adversaries in reconnaissance phases of an attack.

Potential Impact

The primary impact of CVE-2026-1694 is the unintended disclosure of sensitive server configuration information through HTTP headers in PcVue web services. While this does not directly compromise system confidentiality, integrity, or availability, it lowers the barrier for attackers to perform effective reconnaissance. Attackers can leverage this information to identify server software versions, patch levels, or other environmental details that may reveal additional vulnerabilities or misconfigurations. For organizations relying on PcVue for industrial automation, this could increase the risk of targeted attacks, especially in critical infrastructure sectors. However, given the low severity and high complexity of exploitation, the immediate risk is limited. The vulnerability does not allow remote code execution or privilege escalation by itself but could be a stepping stone in multi-stage attacks. The absence of known exploits in the wild further reduces the urgency but does not eliminate the need for mitigation.

Mitigation Recommendations

To mitigate CVE-2026-1694, organizations should implement the following specific actions: 1) Review and customize IIS and ASP.net configurations to explicitly remove or suppress default HTTP headers that disclose server information before deploying PcVue web services. 2) Employ web server hardening best practices such as using URL rewrite rules or custom modules to strip sensitive headers like 'Server', 'X-Powered-By', and others. 3) Conduct thorough security assessments and penetration tests on PcVue deployments to verify that no sensitive information is leaked via HTTP responses. 4) Monitor network traffic and logs for unusual reconnaissance activities targeting PcVue web services. 5) Keep PcVue software updated and apply any vendor patches or configuration guidance when available. 6) Segment and restrict network access to PcVue web services to trusted users and systems only, reducing exposure. 7) Educate system administrators and developers about secure deployment practices for IIS and ASP.net applications. These targeted measures go beyond generic advice by focusing on configuration hygiene and proactive detection tailored to the affected PcVue components.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
arcinfo
Date Reserved
2026-01-30T08:37:56.659Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a00034b7ef31ef0bd40692

Added to database: 2/26/2026, 8:11:32 AM

Last enriched: 3/26/2026, 6:43:40 PM

Last updated: 4/11/2026, 8:20:20 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses