Tollgrade SmartGrid Sensor Management System Software Vulnerabilities
LightHouse SMS Software contains multiple web interface vulnerabilities: cross-site request forgery (CWE-352) allows attackers to perform unauthorized actions in a user's session; cross-site scripting (CWE-79) enables injection of malicious scripts; insecure credential storage (CWE-522) exposes authentication tokens; and sensitive data exposure (CWE-200) leaks grid information. An authenticated user tricked into visiting attacker-controlled content could unknowingly modify sensor configurations, steal credentials, or expose sensitive grid data. The vulnerabilities affect versions 4.1.0_Build_16 and all versions below 5.1, with no vendor patches available.
- - Network access to the LightHouse SMS web interface - User with valid SMS console credentials must be tricked into visiting attacker-controlled content - The SMS system must not have anti-CSRF protections in place - Sensitive data or configuration changes visible in the user's browser session
/api/v1/advisories/6eb35e77-9812-48f2-a7de-95dfdd299967Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.