Metrics
Affected Vendors & Products
No advisories yet.
Solution
This vulnerability has been remediated in the latest patch for WebCTRL 8.0 and Carrier i-Vu and cumulative releases for both product versions 8.5 and above. Please be aware that WebCTRL and i-Vu versions 7.0, 6.5, and 6.1 are no longer supported. To safeguard against these vulnerabilities, upgrading to the latest WebCTRL and i-Vu software is strongly recommended.
Workaround
No workaround given by the vendor.
Sat, 24 Jan 2026 01:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Automatedlogic
Automatedlogic webctrl Carrier Carrier i-vu |
|
| Vendors & Products |
Automatedlogic
Automatedlogic webctrl Carrier Carrier i-vu |
Fri, 23 Jan 2026 08:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 22 Jan 2026 22:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Storing Passwords in a Recoverable Format vulnerability in Automated Logic WebCTRL on Windows, Carrier i-Vu on Windows. Storing Passwords in a Recoverable Format vulnerability (CWE-257) in the Web session management component allows an attacker to access stored passwords in a recoverable format which makes them subject to password reuse attacks by malicious users.This issue affects WebCTRL: from 6.0 through 9.0; i-Vu: from 6.0 through 9.0. | |
| Title | Automated Logic WebCTRL and Carrier i-Vu Session Fixation | |
| Weaknesses | CWE-257 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Carrier
Published:
Updated: 2026-01-22T20:22:40.322Z
Reserved: 2025-12-08T20:44:48.197Z
Link: CVE-2025-14295
Updated: 2026-01-22T20:22:35.763Z
Status : Received
Published: 2026-01-22T13:16:04.207
Modified: 2026-01-22T13:16:04.207
Link: CVE-2025-14295
No data.
OpenCVE Enrichment
Updated: 2026-01-24T01:32:25Z