CVE-2014-0786 (GCVE-0-2014-0786)
Vulnerability from cvelistv5 – Published: 2014-05-01 01:00 – Updated: 2025-10-13 22:50
VLAI?
Summary
Ecava IntegraXor before 4.1.4393 allows remote attackers to read cleartext credentials for administrative accounts via SELECT statements that leverage the guest role.
Severity ?
No CVSS data available.
CWE
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Ecava | IntegraXor |
Affected:
0 , < 4.1.4410
(custom)
|
Credits
Andrea Micalizzi
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:27:19.465Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.integraxor.com/blog/category/security/vulnerability-note/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-091-01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IntegraXor",
"vendor": "Ecava",
"versions": [
{
"lessThan": "4.1.4410",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Andrea Micalizzi"
}
],
"datePublic": "2014-04-29T06:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eEcava IntegraXor before 4.1.4393 allows remote attackers to read cleartext credentials for administrative accounts via SELECT statements that leverage the guest role.\u003c/p\u003e"
}
],
"value": "Ecava IntegraXor before 4.1.4393 allows remote attackers to read cleartext credentials for administrative accounts via SELECT statements that leverage the guest role."
}
],
"metrics": [
{
"cvssV2_0": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-13T22:50:30.946Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.integraxor.com/blog/category/security/vulnerability-note/"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-091-01"
},
{
"url": "http://www.integraxor.com/blog/category/security/vulnerability-note/"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-224-01"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eA customer notification from Ecava has been issued that details this vulnerability and provides mitigation guidance to its customers. Ecava recommends users download and install the update, IntegraXor SCADA Server 4.1.4410, from their support web site:\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://www.integraxor.com/download/igsetup.msi?4.1.4410\"\u003ehttp://www.integraxor.com/download/igsetup.msi?4.1.4410\u003c/a\u003e\u003c/p\u003e\u003cp\u003eFor additional information, please see Ecava\u2019s vulnerability note:\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://www.integraxor.com/blog/category/security/vulnerability-note/\"\u003ehttp://www.integraxor.com/blog/category/security/vulnerability-note/\u003c/a\u003e\u003c/p\u003e\n\n\u003cbr\u003e"
}
],
"value": "A customer notification from Ecava has been issued that details this vulnerability and provides mitigation guidance to its customers. Ecava recommends users download and install the update, IntegraXor SCADA Server 4.1.4410, from their support web site:\u00a0 http://www.integraxor.com/download/igsetup.msi?4.1.4410 \n\nFor additional information, please see Ecava\u2019s vulnerability note:\u00a0 http://www.integraxor.com/blog/category/security/vulnerability-note/"
}
],
"source": {
"advisory": "ICSA-14-091-01",
"discovery": "EXTERNAL"
},
"title": "Ecava IntegraXor Information Exposure",
"x_generator": {
"engine": "Vulnogram 0.2.0"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2014-0786",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Ecava IntegraXor before 4.1.4393 allows remote attackers to read cleartext credentials for administrative accounts via SELECT statements that leverage the guest role."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.integraxor.com/blog/category/security/vulnerability-note/",
"refsource": "CONFIRM",
"url": "http://www.integraxor.com/blog/category/security/vulnerability-note/"
},
{
"name": "http://ics-cert.us-cert.gov/advisories/ICSA-14-091-01",
"refsource": "MISC",
"url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-091-01"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2014-0786",
"datePublished": "2014-05-01T01:00:00",
"dateReserved": "2014-01-02T00:00:00",
"dateUpdated": "2025-10-13T22:50:30.946Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ecava:integraxor:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"4.1.4390\", \"matchCriteriaId\": \"40E2214C-80FC-4973-BF67-1ECFC1C5D303\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ecava:integraxor:4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C254168-384E-4B0A-BB22-445D7281FAC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ecava:integraxor:4.1.4340:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1223B72-A344-450E-8E10-1B704DF894BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ecava:integraxor:4.1.4360:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0319EBA-C39F-4A3D-AF40-7A90FA016696\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ecava:integraxor:4.1.4369:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EA3EDD6-3459-4916-B184-271A43FAC10A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ecava:integraxor:4.1.4380:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4C3DBE0-50B6-4A39-9FA5-878951AD855E\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Ecava IntegraXor before 4.1.4393 allows remote attackers to read cleartext credentials for administrative accounts via SELECT statements that leverage the guest role.\"}, {\"lang\": \"es\", \"value\": \"Ecava IntegraXor anterior a 4.1.4393 permite a atacantes remotos leer credenciales en texto plano para cuentas administrativas a trav\\u00e9s de declaraciones SELECT que aprovechan el rol de invitado.\"}]",
"id": "CVE-2014-0786",
"lastModified": "2024-11-21T02:02:48.120",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2014-05-01T01:56:10.490",
"references": "[{\"url\": \"http://ics-cert.us-cert.gov/advisories/ICSA-14-091-01\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Patch\", \"US Government Resource\"]}, {\"url\": \"http://www.integraxor.com/blog/category/security/vulnerability-note/\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://ics-cert.us-cert.gov/advisories/ICSA-14-091-01\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"US Government Resource\"]}, {\"url\": \"http://www.integraxor.com/blog/category/security/vulnerability-note/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-310\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2014-0786\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2014-05-01T01:56:10.490\",\"lastModified\":\"2025-10-13T23:15:34.280\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Ecava IntegraXor before 4.1.4393 allows remote attackers to read cleartext credentials for administrative accounts via SELECT statements that leverage the guest role.\"},{\"lang\":\"es\",\"value\":\"Ecava IntegraXor anterior a 4.1.4393 permite a atacantes remotos leer credenciales en texto plano para cuentas administrativas a trav\u00e9s de declaraciones SELECT que aprovechan el rol de invitado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-310\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecava:integraxor:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.1.4390\",\"matchCriteriaId\":\"40E2214C-80FC-4973-BF67-1ECFC1C5D303\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecava:integraxor:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C254168-384E-4B0A-BB22-445D7281FAC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecava:integraxor:4.1.4340:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1223B72-A344-450E-8E10-1B704DF894BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecava:integraxor:4.1.4360:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0319EBA-C39F-4A3D-AF40-7A90FA016696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecava:integraxor:4.1.4369:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA3EDD6-3459-4916-B184-271A43FAC10A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ecava:integraxor:4.1.4380:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4C3DBE0-50B6-4A39-9FA5-878951AD855E\"}]}]}],\"references\":[{\"url\":\"http://www.integraxor.com/blog/category/security/vulnerability-note/\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.integraxor.com/blog/category/security/vulnerability-note/\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.integraxor.com/blog/category/security/vulnerability-note/\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.integraxor.com/blog/category/security/vulnerability-note/\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-14-091-01\",\"source\":\"ics-cert@hq.dhs.gov\"},{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-14-224-01\",\"source\":\"ics-cert@hq.dhs.gov\"},{\"url\":\"http://ics-cert.us-cert.gov/advisories/ICSA-14-091-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"US Government Resource\"]},{\"url\":\"http://www.integraxor.com/blog/category/security/vulnerability-note/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…