CVE-2025-14295
Recoverable Password Storage Vulnerability in WebCTRL and i-Vu
Publication date: 2026-01-22
Last updated on: 2026-01-22
Assigner: Carrier Global Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| automated_logic | webctrl | From 6.0 (inc) to 9.0 (inc) |
| carrier | i-vu | From 6.0 (inc) to 9.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-257 | The storage of passwords in a recoverable format makes them subject to password reuse attacks by malicious users. In fact, it should be noted that recoverable encrypted passwords provide no significant benefit over plaintext passwords since they are subject not only to reuse by malicious attackers but also by malicious insiders. If a system administrator can recover a password directly, or use a brute force search on the available information, the administrator can use the password on other accounts. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves storing passwords in a recoverable format within the Web session management component of Automated Logic WebCTRL and Carrier i-Vu on Windows. Because passwords are stored in a way that they can be retrieved, an attacker who gains access to this storage can obtain the passwords and potentially reuse them maliciously.
How can this vulnerability impact me? :
The vulnerability can allow attackers to access stored passwords in a recoverable format, which can lead to password reuse attacks. This compromises the security of user accounts and systems, potentially allowing unauthorized access and further exploitation.