CVE-2018-15808
📋 TL;DR
POSIM EVO 15.13 for Windows contains hardcoded database credentials for the root user, allowing attackers to access the database with full privileges. This could lead to data breaches, system compromise, or remote code execution on connected clients. All installations of POSIM EVO 15.13 for Windows are affected.
💻 Affected Systems
- POSIM EVO
📦 What is this software?
Evo by Posim
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full control of the database, exfiltrate sensitive data, execute arbitrary code on connected POSIM EVO clients, and potentially pivot to other systems.
Likely Case
Unauthorized database access leading to data theft, manipulation of transaction records, and potential financial fraud.
If Mitigated
Limited impact if database is isolated behind firewalls, but credentials remain exposed in the application.
🎯 Exploit Status
Exploitation requires only knowledge of the hardcoded credentials and network access to the database.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No vendor advisory found
Restart Required: No
Instructions:
No official patch available. Contact POSIM vendor for updated version or guidance.
🔧 Temporary Workarounds
Change Database Credentials
allChange the root database password and update the application configuration to use new credentials.
ALTER USER 'root'@'%' IDENTIFIED BY 'new_strong_password';
Network Segmentation
allRestrict database access to only the POSIM EVO application server using firewall rules.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate the database from untrusted networks
- Monitor database access logs for unauthorized root user connections
🔍 How to Verify
Check if Vulnerable:
Check if POSIM EVO version is 15.13 and examine application configuration files for hardcoded database credentials.
Check Version:
Check POSIM EVO application version in the software interface or configuration files.
Verify Fix Applied:
Verify that database credentials have been changed and are no longer hardcoded in the application.
📡 Detection & Monitoring
Log Indicators:
- Failed or successful database authentication attempts using root user
- Unusual database queries from unexpected sources
Network Indicators:
- Database connection attempts on default ports (3306 for MySQL) from unauthorized IPs
SIEM Query:
source="database_logs" user="root" AND (action="connect" OR action="query") | stats count by src_ip