Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22543: CWE-261: Week encoding for passwords in EFACEC QC 60/90/120

0
Medium
VulnerabilityCVE-2026-22543cvecve-2026-22543cwe-261
Published: Wed Jan 07 2026 (01/07/2026, 16:10:57 UTC)
Source: CVE Database V5
Vendor/Project: EFACEC
Product: QC 60/90/120

Description

The credentials required to access the device's web server are sent in base64 within the HTTP headers. Since base64 is not considered a strong cipher, an attacker could intercept the web request handling the login and obtain the credentials

AI-Powered Analysis

AILast updated: 01/07/2026, 16:42:14 UTC

Technical Analysis

CVE-2026-22543 identifies a weakness in the EFACEC QC 60/90/120 product line where the authentication credentials for the device's web server are transmitted using base64 encoding within HTTP headers. Base64 encoding is not encryption but merely an encoding scheme, making it trivial for an attacker intercepting network traffic to decode and obtain the plaintext credentials. This vulnerability falls under CWE-261, which concerns weak encoding of sensitive information. The affected product version is 8, and the vulnerability was published on January 7, 2026. The CVSS 4.0 vector indicates an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality (VC:H) but no impact on integrity or availability. The vulnerability does not require user interaction and can be exploited by an attacker with access to the same network segment as the device. Since the credentials are sent in base64 over HTTP headers, if the communication is not protected by TLS or other encryption, an attacker performing a man-in-the-middle or network sniffing attack can easily decode the credentials and gain unauthorized access to the device's web interface. This could lead to unauthorized configuration changes or further compromise of the network. No patches or exploits are currently reported, but the weakness in credential transmission represents a significant risk if left unmitigated.

Potential Impact

For European organizations, the primary impact is the potential compromise of EFACEC QC devices' administrative interfaces, which could lead to unauthorized access and control over critical infrastructure components or industrial control systems where these devices are deployed. This could result in confidentiality breaches, unauthorized configuration changes, and potential disruption of services. Given that EFACEC is a Portuguese company with a strong presence in Portugal and Spain, organizations in these countries are more likely to be affected. The vulnerability's exploitation requires network adjacency, so organizations with poorly segmented networks or exposed management interfaces are at higher risk. The medium severity reflects that while the vulnerability does not directly impact system availability or integrity, the exposure of credentials can lead to further attacks and compromise. The lack of encryption in credential transmission also indicates a broader risk posture issue that could affect compliance with European data protection regulations such as GDPR if sensitive information is exposed.

Mitigation Recommendations

1. Immediately restrict network access to the EFACEC QC device web interfaces by implementing strict network segmentation and firewall rules to limit access to trusted management networks only. 2. Deploy VPNs or encrypted tunnels (e.g., IPsec, TLS) for all management traffic to ensure credentials are not transmitted in cleartext or easily reversible encoding. 3. Verify and enforce the use of HTTPS with valid certificates on the device web server to protect credentials in transit. 4. Implement strong authentication mechanisms such as multi-factor authentication (MFA) if supported by the device or through external authentication proxies. 5. Regularly monitor network traffic for suspicious activities, including repeated failed login attempts or unusual access patterns to the device management interface. 6. Engage with EFACEC for firmware updates or patches that address this vulnerability and plan for timely deployment once available. 7. Conduct security awareness training for network administrators to recognize the risks of weak credential transmission and enforce best practices. 8. Consider deploying network intrusion detection/prevention systems (IDS/IPS) to detect attempts to intercept or exploit this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
S21sec
Date Reserved
2026-01-07T14:01:04.829Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695e89727349d0379daecb50

Added to database: 1/7/2026, 4:27:30 PM

Last enriched: 1/7/2026, 4:42:14 PM

Last updated: 1/9/2026, 1:36:16 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats