Sinapsi created a new version to mitigate a vulnerability with plain text passwords in its eSolar Light application, according to a report on ICS-CERT.
Sinapsi eSolar Light firmware versions prior to 2.0.3970_schsl_2.2.85 suffer from the vulnerability, discovered by Independent researcher Maxim Rupp.
Access to the plaintext passwords will compromise the confidentiality and integrity of the mail client.
Sinapsi is an Italy-based company and the affected product, Sinapsi eSolar Light, is a stand-alone system for the monitoring and management of local and remote maintenance of small size photovoltaic (PV) plants.
Sinapsi eSolar Light deploys across several sectors including commercial facilities, critical manufacturing, energy, and water and wastewater systems. Sinapsi estimates these products see use worldwide.
An attacker is able to view saved passwords from the DNS and mail configuration by viewing the mail configuration page source.
CVE-2015-3949 is the case number assigned to this vulnerability, which has a CVSS v2 base score of 7.2.
This vulnerability is not exploitable remotely and cannot end up exploited without user interaction. The exploit only triggers when a local user accesses the mail configuration option.
No known public exploits specifically target this vulnerability. An attacker with a low skill would be able to exploit this vulnerability.
Sinapsi developed a fix for the problem in firmware version 2.0.3970_schsl_2.2.85. Contact Sinapsi through its web site for support in obtaining this firmware.