LCDS - Leão Consultoria e Desenvolvimento de Sistemas Ltda ME LAquis SCADA ELS Files
Monitor7.8ICS-CERT ICSA-19-073-01Mar 14, 2019
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
LAquis SCADA version 4.1.0.4150 and earlier contain a buffer overflow vulnerability (CWE-787) that allows local code execution. The vulnerability is triggered when a user opens a malicious file or link on a system running the affected SCADA software. Successful exploitation grants an attacker the ability to run arbitrary commands within the SCADA application context, potentially compromising process integrity and operational safety. The vulnerability requires local file system access and user interaction; no public exploits are currently known.
What this means
What could happen
A local attacker with user interaction could execute arbitrary code on the SCADA system, potentially allowing them to alter control logic, setpoints, or process parameters without authorization.
Who's at risk
Energy sector organizations using LAquis SCADA for process monitoring and control. Specifically impacts facilities that rely on SCADA operators to interact with files and communications as part of daily operations.
How it could be exploited
An attacker must trick a user into opening a malicious file or clicking a link on the local system where LAquis SCADA is installed. Once the user interacts with the crafted content, the attacker's code runs with the permissions of the SCADA application, enabling process manipulation or data corruption.
Prerequisites
- Local file system access or ability to deliver social engineering payload to an authorized SCADA operator
- User interaction required—operator must open the malicious file or click a link
- LAquis SCADA version 4.1.0.4150 or earlier installed and in use
Local exploitation requiredUser interaction neededAffects SCADA control systemHigh impact if exploited
Exploitability
Low exploit probability (EPSS 0.2%)
Affected products (1)
ProductAffected VersionsFix Status
SCADA: 4.1.0.41504.1.0.4150No fix yet
Remediation & Mitigation
0/3
Do now
0/1WORKAROUNDTrain operators and engineering staff to recognize and avoid opening unsolicited email attachments and clicking unverified web links, especially from unknown senders
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate LAquis SCADA to version 4.3.1.71 or later from https://laquisscada.com
Long-term hardening
0/1HARDENINGRestrict physical and network access to SCADA engineering workstations and servers to authorized personnel only
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/7b3c106f-3f26-4a14-bd10-c140ce0d1bec