PT-2014-08: Password Access in Solar-Log

Vulnerable products

Solar-Log 200
Solar-Log 300
Solar-Log 500
Solar-Log 800e
Solar-Log 1000
Solar-Log 1200
Solar-Log 2000

Firmware: all versions before 3.1.1-66


Severity level

Severity level: Medium
Impact: Information Disclosure
Access Vector: Remote

CVSS v2:
Base Score: 5.0
Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE: not assigned

Software description

Solar-Log – is a component of a photoelectric control system intended to collect data, implement a remote diagnostics and system performance monitoring.

Vulnerability description

The specialists of the Positive Research center have detected a Password Access vulnerability in Solar-Log.

Application uses some kind of "encryption" for password stored in the configuration file with a static key. Attacker can get a password in plain text.

How to fix

Update your firmware up to the latest version

Advisory status

11.04.2014 - Vendor gets vulnerability details
14.04.2014 - Vendor releases fixed version and details
05.05.2014 - Public disclosure


The vulnerability was detected by Artem Chaykin, Positive Research Center (Positive Technologies Company)


Reports on the vulnerabilities previously discovered by Positive Research:

4G and 5G are not ready for smart cities