ID

VAR-201902-0651


CVE

CVE-2018-18998


TITLE

LCDS Laquis SCADA Vulnerabilities related to the use of hard-coded credentials

Trust: 0.8

sources: JVNDB: JVNDB-2018-014313

DESCRIPTION

LCDS Laquis SCADA prior to version 4.1.0.4150 uses hard coded credentials, which may allow an attacker unauthorized access to the system with high privileges. LCDS Laquis SCADA Contains a vulnerability in the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to bypass authentication on vulnerable installations of LAquis SCADA Software. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of login requests to the product's webserver. The product contains a hard-coded password for a number of undocumented accounts. An attacker can leverage this vulnerability to bypass authentication on the system. LCDS LAquis SCADA is a SCADA (Data Acquisition and Monitoring Control) system from LCDS, Brazil. The system is mainly used for data acquisition and process control of devices with communication technology. A security vulnerability exists in the LCDS LAquis SCADA version 4.1.0.3870, which stems from the fact that the program uses hard-coded credentials. LCDS LAquis SCADA is prone to multiple security vulnerabilities. An attacker may leverage these issues to execute arbitrary code, perform unauthorized actions or gain access to sensitive information that may aid in further attacks. Failed attempts will likely cause a denial-of-service condition. LCDS LAquis SCADA version 4.1.0.3870 is vulnerable; other versions may also be affected

Trust: 3.24

sources: NVD: CVE-2018-18998 // JVNDB: JVNDB-2018-014313 // ZDI: ZDI-19-067 // CNVD: CNVD-2019-28121 // BID: 106634 // IVD: d50256e2-a4e6-403f-89b1-54340f354701

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: d50256e2-a4e6-403f-89b1-54340f354701 // CNVD: CNVD-2019-28121

AFFECTED PRODUCTS

vendor:lcdsmodel:laquis scadascope:ltversion:4.1.0.4150

Trust: 1.8

vendor:laquis scadamodel:softwarescope: - version: -

Trust: 0.7

vendor:lcdsmodel:laquis scadascope:eqversion:4.1.0.3870

Trust: 0.6

vendor:lcdsmodel:leão consultoria e desenvolvimento de sistemas ltda me laquis scadascope:eqversion:-4.1.0.3870

Trust: 0.3

vendor:lcdsmodel:leão consultoria e desenvolvimento de sistemas ltda me laquis scadascope:neversion:-4.1.0.4150

Trust: 0.3

vendor:laquis scadamodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: d50256e2-a4e6-403f-89b1-54340f354701 // ZDI: ZDI-19-067 // CNVD: CNVD-2019-28121 // BID: 106634 // JVNDB: JVNDB-2018-014313 // NVD: CVE-2018-18998

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-18998
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-18998
value: CRITICAL

Trust: 0.8

ZDI: CVE-2018-18998
value: HIGH

Trust: 0.7

CNVD: CNVD-2019-28121
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201901-519
value: CRITICAL

Trust: 0.6

IVD: d50256e2-a4e6-403f-89b1-54340f354701
value: CRITICAL

Trust: 0.2

nvd@nist.gov: CVE-2018-18998
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.5

CNVD: CNVD-2019-28121
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: d50256e2-a4e6-403f-89b1-54340f354701
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2018-18998
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: d50256e2-a4e6-403f-89b1-54340f354701 // ZDI: ZDI-19-067 // CNVD: CNVD-2019-28121 // JVNDB: JVNDB-2018-014313 // CNNVD: CNNVD-201901-519 // NVD: CVE-2018-18998

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.8

sources: JVNDB: JVNDB-2018-014313 // NVD: CVE-2018-18998

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201901-519

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201901-519

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-014313

PATCH

title:TopPageurl:https://laquisscada.com/

Trust: 0.8

title:LAquis SCADA has issued an update to correct this vulnerability.url:https://ics-cert.us-cert.gov/advisories/ICSA-19-015-01

Trust: 0.7

title:LCDS LAquis SCADA has an unexplained patchurl:https://www.cnvd.org.cn/patchInfo/show/176017

Trust: 0.6

title:LCDS LAquis SCADA Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=88645

Trust: 0.6

sources: ZDI: ZDI-19-067 // CNVD: CNVD-2019-28121 // JVNDB: JVNDB-2018-014313 // CNNVD: CNNVD-201901-519

EXTERNAL IDS

db:NVDid:CVE-2018-18998

Trust: 4.2

db:ICS CERTid:ICSA-19-015-01

Trust: 2.7

db:BIDid:106634

Trust: 1.9

db:CNVDid:CNVD-2019-28121

Trust: 0.8

db:CNNVDid:CNNVD-201901-519

Trust: 0.8

db:JVNDBid:JVNDB-2018-014313

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-6677

Trust: 0.7

db:ZDIid:ZDI-19-067

Trust: 0.7

db:ICS CERTid:ICSA-19-015-01T

Trust: 0.6

db:IVDid:D50256E2-A4E6-403F-89B1-54340F354701

Trust: 0.2

sources: IVD: d50256e2-a4e6-403f-89b1-54340f354701 // ZDI: ZDI-19-067 // CNVD: CNVD-2019-28121 // BID: 106634 // JVNDB: JVNDB-2018-014313 // CNNVD: CNNVD-201901-519 // NVD: CVE-2018-18998

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-19-015-01

Trust: 3.4

url:http://www.securityfocus.com/bid/106634

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-18998

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18998

Trust: 0.8

url:https://ics-cert.us-cert.gov/advisories/icsa-19-015-01third party advisoryus government resource

Trust: 0.6

url:http://www.securityfocus.com/bid/106634third party advisoryvdb entry

Trust: 0.6

url:https://laquisscada.com/

Trust: 0.3

sources: ZDI: ZDI-19-067 // CNVD: CNVD-2019-28121 // BID: 106634 // JVNDB: JVNDB-2018-014313 // CNNVD: CNNVD-201901-519 // NVD: CVE-2018-18998

CREDITS

Esteban Ruiz (mr_me) of Source Incite

Trust: 0.7

sources: ZDI: ZDI-19-067

SOURCES

db:IVDid:d50256e2-a4e6-403f-89b1-54340f354701
db:ZDIid:ZDI-19-067
db:CNVDid:CNVD-2019-28121
db:BIDid:106634
db:JVNDBid:JVNDB-2018-014313
db:CNNVDid:CNNVD-201901-519
db:NVDid:CVE-2018-18998

LAST UPDATE DATE

2024-11-23T21:52:29.760000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-19-067date:2019-01-19T00:00:00
db:CNVDid:CNVD-2019-28121date:2019-08-20T00:00:00
db:BIDid:106634date:2019-01-15T00:00:00
db:JVNDBid:JVNDB-2018-014313date:2019-03-15T00:00:00
db:CNNVDid:CNNVD-201901-519date:2019-10-17T00:00:00
db:NVDid:CVE-2018-18998date:2024-11-21T03:57:00.807

SOURCES RELEASE DATE

db:IVDid:d50256e2-a4e6-403f-89b1-54340f354701date:2019-08-20T00:00:00
db:ZDIid:ZDI-19-067date:2019-01-19T00:00:00
db:CNVDid:CNVD-2019-28121date:2019-08-20T00:00:00
db:BIDid:106634date:2019-01-15T00:00:00
db:JVNDBid:JVNDB-2018-014313date:2019-03-15T00:00:00
db:CNNVDid:CNNVD-201901-519date:2019-01-16T00:00:00
db:NVDid:CVE-2018-18998date:2019-02-05T18:29:00.710