ID

VAR-201902-0649


CVE

CVE-2018-18992


TITLE

LCDS LAquis SCADA Injection Vulnerability

Trust: 2.0

sources: CNVD: CNVD-2019-28112 // JVNDB: JVNDB-2018-014315 // CNNVD: CNNVD-201901-517

DESCRIPTION

LCDS Laquis SCADA prior to version 4.1.0.4150 allows taking in user input without proper sanitation, which may allow an attacker to execute remote code on the server. LCDS Laquis SCADA Contains an injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of calls to relatorioindividual.lhtml. When parsing the TAG Element, the process does not properly sanitize user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to execute code in the context of the aq process. LCDS LAquis SCADA is a SCADA (Data Acquisition and Monitoring Control) system from LCDS, Brazil. The system is mainly used for data acquisition and process control of devices with communication technology. A security vulnerability exists in the LCDS LAquis SCADA version 4.1.0.3870, which was caused by a user receiving a user input without properly filtering it. LCDS LAquis SCADA is prone to multiple security vulnerabilities. An attacker may leverage these issues to execute arbitrary code, perform unauthorized actions or gain access to sensitive information that may aid in further attacks. Failed attempts will likely cause a denial-of-service condition. LCDS LAquis SCADA version 4.1.0.3870 is vulnerable; other versions may also be affected

Trust: 5.13

sources: NVD: CVE-2018-18992 // JVNDB: JVNDB-2018-014315 // ZDI: ZDI-19-061 // ZDI: ZDI-19-059 // ZDI: ZDI-19-062 // ZDI: ZDI-19-063 // CNVD: CNVD-2019-28112 // BID: 106634 // IVD: 6fadf373-9b63-41a2-829a-f80acd255e43

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 6fadf373-9b63-41a2-829a-f80acd255e43 // CNVD: CNVD-2019-28112

AFFECTED PRODUCTS

vendor:laquis scadamodel:softwarescope: - version: -

Trust: 2.8

vendor:lcdsmodel:laquis scadascope:ltversion:4.1.0.4150

Trust: 1.8

vendor:lcdsmodel:laquis scadascope:eqversion:4.1.0.3870

Trust: 0.6

vendor:lcdsmodel:leão consultoria e desenvolvimento de sistemas ltda me laquis scadascope:eqversion:-4.1.0.3870

Trust: 0.3

vendor:lcdsmodel:leão consultoria e desenvolvimento de sistemas ltda me laquis scadascope:neversion:-4.1.0.4150

Trust: 0.3

vendor:laquis scadamodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 6fadf373-9b63-41a2-829a-f80acd255e43 // ZDI: ZDI-19-061 // ZDI: ZDI-19-059 // ZDI: ZDI-19-062 // ZDI: ZDI-19-063 // CNVD: CNVD-2019-28112 // BID: 106634 // JVNDB: JVNDB-2018-014315 // NVD: CVE-2018-18992

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2018-18992
value: HIGH

Trust: 2.8

nvd@nist.gov: CVE-2018-18992
value: HIGH

Trust: 1.0

NVD: CVE-2018-18992
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-28112
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201901-517
value: HIGH

Trust: 0.6

IVD: 6fadf373-9b63-41a2-829a-f80acd255e43
value: HIGH

Trust: 0.2

ZDI: CVE-2018-18992
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.8

nvd@nist.gov: CVE-2018-18992
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-28112
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 6fadf373-9b63-41a2-829a-f80acd255e43
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2018-18992
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: 6fadf373-9b63-41a2-829a-f80acd255e43 // ZDI: ZDI-19-061 // ZDI: ZDI-19-059 // ZDI: ZDI-19-062 // ZDI: ZDI-19-063 // CNVD: CNVD-2019-28112 // JVNDB: JVNDB-2018-014315 // CNNVD: CNNVD-201901-517 // NVD: CVE-2018-18992

PROBLEMTYPE DATA

problemtype:CWE-74

Trust: 1.8

sources: JVNDB: JVNDB-2018-014315 // NVD: CVE-2018-18992

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201901-517

TYPE

injection

Trust: 0.8

sources: IVD: 6fadf373-9b63-41a2-829a-f80acd255e43 // CNNVD: CNNVD-201901-517

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-014315

PATCH

title:LAquis SCADA has issued an update to correct this vulnerability.url:https://ics-cert.us-cert.gov/advisories/ICSA-19-015-01

Trust: 2.8

title:TopPageurl:https://laquisscada.com/

Trust: 0.8

title:LCDS LAquis SCADA injection vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/176011

Trust: 0.6

title:LCDS LAquis SCADA Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=88647

Trust: 0.6

sources: ZDI: ZDI-19-061 // ZDI: ZDI-19-059 // ZDI: ZDI-19-062 // ZDI: ZDI-19-063 // CNVD: CNVD-2019-28112 // JVNDB: JVNDB-2018-014315 // CNNVD: CNNVD-201901-517

EXTERNAL IDS

db:NVDid:CVE-2018-18992

Trust: 6.3

db:ICS CERTid:ICSA-19-015-01

Trust: 3.3

db:BIDid:106634

Trust: 1.9

db:CNVDid:CNVD-2019-28112

Trust: 0.8

db:CNNVDid:CNNVD-201901-517

Trust: 0.8

db:JVNDBid:JVNDB-2018-014315

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-6671

Trust: 0.7

db:ZDIid:ZDI-19-061

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-6668

Trust: 0.7

db:ZDIid:ZDI-19-059

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-6672

Trust: 0.7

db:ZDIid:ZDI-19-062

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-6673

Trust: 0.7

db:ZDIid:ZDI-19-063

Trust: 0.7

db:ICS CERTid:ICSA-19-015-01T

Trust: 0.6

db:IVDid:6FADF373-9B63-41A2-829A-F80ACD255E43

Trust: 0.2

sources: IVD: 6fadf373-9b63-41a2-829a-f80acd255e43 // ZDI: ZDI-19-061 // ZDI: ZDI-19-059 // ZDI: ZDI-19-062 // ZDI: ZDI-19-063 // CNVD: CNVD-2019-28112 // BID: 106634 // JVNDB: JVNDB-2018-014315 // CNNVD: CNNVD-201901-517 // NVD: CVE-2018-18992

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-19-015-01

Trust: 6.1

url:http://www.securityfocus.com/bid/106634

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-18992

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18992

Trust: 0.8

url:https://ics-cert.us-cert.gov/advisories/icsa-19-015-01third party advisoryus government resource

Trust: 0.6

url:http://www.securityfocus.com/bid/106634third party advisoryvdb entry

Trust: 0.6

url:https://laquisscada.com/

Trust: 0.3

sources: ZDI: ZDI-19-061 // ZDI: ZDI-19-059 // ZDI: ZDI-19-062 // ZDI: ZDI-19-063 // CNVD: CNVD-2019-28112 // BID: 106634 // JVNDB: JVNDB-2018-014315 // CNNVD: CNNVD-201901-517 // NVD: CVE-2018-18992

CREDITS

Esteban Ruiz (mr_me) of Source Incite

Trust: 2.8

sources: ZDI: ZDI-19-061 // ZDI: ZDI-19-059 // ZDI: ZDI-19-062 // ZDI: ZDI-19-063

SOURCES

db:IVDid:6fadf373-9b63-41a2-829a-f80acd255e43
db:ZDIid:ZDI-19-061
db:ZDIid:ZDI-19-059
db:ZDIid:ZDI-19-062
db:ZDIid:ZDI-19-063
db:CNVDid:CNVD-2019-28112
db:BIDid:106634
db:JVNDBid:JVNDB-2018-014315
db:CNNVDid:CNNVD-201901-517
db:NVDid:CVE-2018-18992

LAST UPDATE DATE

2024-08-14T13:26:57.931000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-19-061date:2019-01-19T00:00:00
db:ZDIid:ZDI-19-059date:2019-01-19T00:00:00
db:ZDIid:ZDI-19-062date:2019-01-19T00:00:00
db:ZDIid:ZDI-19-063date:2019-01-19T00:00:00
db:CNVDid:CNVD-2019-28112date:2019-08-20T00:00:00
db:BIDid:106634date:2019-01-15T00:00:00
db:JVNDBid:JVNDB-2018-014315date:2019-03-15T00:00:00
db:CNNVDid:CNNVD-201901-517date:2019-10-17T00:00:00
db:NVDid:CVE-2018-18992date:2019-10-09T23:37:32.427

SOURCES RELEASE DATE

db:IVDid:6fadf373-9b63-41a2-829a-f80acd255e43date:2019-08-20T00:00:00
db:ZDIid:ZDI-19-061date:2019-01-19T00:00:00
db:ZDIid:ZDI-19-059date:2019-01-19T00:00:00
db:ZDIid:ZDI-19-062date:2019-01-19T00:00:00
db:ZDIid:ZDI-19-063date:2019-01-19T00:00:00
db:CNVDid:CNVD-2019-28112date:2019-08-20T00:00:00
db:BIDid:106634date:2019-01-15T00:00:00
db:JVNDBid:JVNDB-2018-014315date:2019-03-15T00:00:00
db:CNNVDid:CNNVD-201901-517date:2019-01-16T00:00:00
db:NVDid:CVE-2018-18992date:2019-02-05T18:29:00.617