CVE-2018-14916

9.1 CRITICAL

📋 TL;DR

CVE-2018-14916 allows unauthenticated attackers to delete arbitrary files on LOYTEC LGATE-902 devices through directory traversal vulnerabilities. This affects LOYTEC LGATE-902 devices running firmware version 6.3.2, potentially impacting building automation and industrial control systems.

💻 Affected Systems

Products:
  • LOYTEC LGATE-902
Versions: 6.3.2
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Devices are typically deployed in building automation and industrial control environments. Default web interface configuration is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files, leading to device bricking, service disruption, or enabling further attacks by removing security controls.

🟠

Likely Case

Service disruption through deletion of configuration files or application data, potentially causing building automation systems to malfunction.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict network segmentation and file integrity monitoring is in place.

🌐 Internet-Facing: HIGH - Exploitation requires no authentication and can be performed remotely via HTTP requests.
🏢 Internal Only: MEDIUM - Still vulnerable to internal attackers or compromised internal systems, but attack surface is reduced.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code exists showing HTTP requests with directory traversal sequences to delete files. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Later than 6.3.2 (check vendor for specific version)

Vendor Advisory: https://www.loytec.com/support/security-advisories

Restart Required: Yes

Instructions:

1. Contact LOYTEC support for latest firmware. 2. Backup current configuration. 3. Upload new firmware via web interface. 4. Restart device. 5. Restore configuration if needed.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate LGATE-902 devices from untrusted networks using firewalls

Access Control Lists

all

Restrict HTTP access to device web interface to trusted IP addresses only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate devices from untrusted networks
  • Deploy web application firewall (WAF) with directory traversal protection rules

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface at http://device-ip/status or via SSH if enabled. Version 6.3.2 is vulnerable.

Check Version:

curl -s http://device-ip/status | grep -i version

Verify Fix Applied:

Verify firmware version is updated beyond 6.3.2. Test file deletion attempts with traversal sequences should fail.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' sequences
  • File deletion events in system logs
  • Web interface access from unusual IPs

Network Indicators:

  • HTTP requests with traversal patterns (e.g., GET /../../etc/passwd)
  • Multiple DELETE or POST requests to file paths

SIEM Query:

source="web_logs" AND (uri="*../*" OR method="DELETE" AND uri="*")

🔗 References

📤 Share & Export