LCDS LAquis SCADA
Plan Patch7.8ICS-CERT ICSA-24-142-01May 21, 2024
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
LAquis SCADA versions 4.7.1.7 and earlier contain a path traversal vulnerability (CWE-22) that allows an attacker with local access to read and write files outside of the application's intended directory. The vulnerability requires user interaction and is not remotely exploitable. An attacker exploiting this could access sensitive files such as credentials, configuration setpoints, or system files that control SCADA operations.
What this means
What could happen
An attacker with local access to a LAquis SCADA system could read and write files outside the intended application directory, potentially modifying control system configurations or extracting sensitive data. This could disrupt SCADA operations or expose credentials and setpoints used to manage energy systems.
Who's at risk
Energy sector operators running LAquis SCADA systems, particularly utilities managing power generation or distribution. Equipment affected includes SCADA control servers and operator workstations running vulnerable versions of the software that can be used to monitor and control critical infrastructure.
How it could be exploited
An attacker must first gain local access to the LAquis SCADA host machine (physical console or lateral movement from a compromised workstation on the same network). Once local, the attacker can exploit a path traversal vulnerability in the application to access files outside the restricted directory—for example, reading configuration files with credentials or writing to system files to alter process setpoints or disable monitoring.
Prerequisites
- Local access to the LAquis SCADA host (console or lateral network access)
- User interaction required (e.g., the user must open a malicious file or follow a link that triggers the path traversal)
- LAquis SCADA version 4.7.1.7 or earlier installed
Local access required (not remotely exploitable)User interaction required (low likelihood of automated attack)Low EPSS score (0.1% probability)Affects SCADA system configuration and data integrity
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (1)
ProductAffected VersionsFix Status
LAquis SCADA: <=4.7.1.7≤ 4.7.1.74.7.1.371 or newer of LAquis SCADA which has been configured to resolve the reported path traversal issues
Remediation & Mitigation
0/4
Do now
0/2HARDENINGRestrict physical access to LAquis SCADA systems and workstations
HARDENINGEnforce least privilege access controls—limit user permissions to only those necessary for their role
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate LAquis SCADA to version 4.7.1.371 or newer
Long-term hardening
0/1HARDENINGSegment the SCADA network from general IT networks and limit lateral movement paths from compromised endpoints
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/183dbf0a-6ad0-4ce0-8a42-d724fb1c5a31