CVE-2021-41579
https://notcve.org/view.php?id=CVE-2021-41579
LCDS LAquis SCADA through 4.3.1.1085 is vulnerable to a control bypass and path traversal. If an attacker can get a victim to load a malicious els project file and use the play feature, then the attacker can bypass a consent popup and write arbitrary files to OS locations where the user has permission, leading to code execution. LCDS LAquis SCADA versiones hasta 4.3.1.1085, es vulnerable a una omisión de control y salto de ruta. Si un atacante puede conseguir que una víctima cargue un archivo de proyecto els malicioso y use la funcionalidad play, entonces el atacante puede omitir una ventana emergente de consentimiento y escribir archivos arbitrarios en ubicaciones del Sistema Operativo donde el usuario tenga permiso, conllevando a una ejecución de código • https://github.com/jacob-baines/vuln_disclosure/blob/main/vuln_2021_04.txt • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2020-25188 – LAquis SCADA LQS File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-25188
An attacker who convinces a valid user to open a specially crafted project file to exploit could execute code under the privileges of the application due to an out-of-bounds read vulnerability on the LAquis SCADA (Versions prior to 4.3.1.870). Un atacante que convenza a un usuario válido de abrir un archivo de proyecto especialmente diseñado para explotarlo podría ejecutar código bajo los privilegios de la aplicación debido a una vulnerabilidad de lectura fuera de límites en LAquis SCADA (versiones anteriores a 4.3.1.870) This vulnerability allows remote attackers to execute arbitrary code on affected installations of LAquis SCADA. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of LQS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://us-cert.cisa.gov/ics/advisories/icsa-20-287-02 https://www.zerodayinitiative.com/advisories/ZDI-20-1244 • CWE-125: Out-of-bounds Read •
CVE-2019-10994 – LAquis SCADA LQS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2019-10994
Processing a specially crafted project file in LAquis SCADA 4.3.1.71 may trigger an out-of-bounds read, which may allow an attacker to obtain sensitive information. The attacker must have local access to the system. A CVSS v3 base score of 2.5 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N). El procesamiento de un archivo de proyecto especialmente diseñado en LAquis SCADA versión 4.3.1.71, puede desencadenar una lectura fuera de límites, lo que puede permitir a un atacante obtener información confidencial. El atacante requiere tener acceso local al sistema. • https://www.us-cert.gov/ics/advisories/icsa-19-213-06 • CWE-125: Out-of-bounds Read •
CVE-2019-10980 – LAquis SCADA LQS File Parsing Type Confusion Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2019-10980
A type confusion vulnerability may be exploited when LAquis SCADA 4.3.1.71 processes a specially crafted project file. This may allow an attacker to execute remote code. The attacker must have local access to the system. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Una vulnerabilidad de confusión de tipo puede ser explotada cuando LAquis SCADA versión 4.3.1.71, procesa un archivo de proyecto especialmente diseñado. • https://www.us-cert.gov/ics/advisories/icsa-19-213-06 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
CVE-2018-18994 – LAquis SCADA LQS File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-18994
LCDS Laquis SCADA prior to version 4.1.0.4150 allows an out of bounds read when opening a specially crafted project file, which may cause a system crash or allow data exfiltration. LCDS Laquis SCADA, en versiones anteriores a la 4.1.0.4150, permite una lectura fuera de límites al abrir un archivo de proyecto especialmente manipulado, lo que podría provocar un cierre inesperado del sistema o permitir la exfiltración de datos. This vulnerability allows remote attackers to execute arbitrary code User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of LQS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the process. • https://ics-cert.us-cert.gov/advisories/ICSA-19-015-01 • CWE-125: Out-of-bounds Read •