CVE-2018-15808

9.8 CRITICAL

📋 TL;DR

POSIM EVO 15.13 for Windows contains hardcoded database credentials for the root user, allowing attackers to access the database with full privileges. This could lead to data breaches, system compromise, or remote code execution on connected clients. All installations of POSIM EVO 15.13 for Windows are affected.

💻 Affected Systems

Products:
  • POSIM EVO
Versions: 15.13
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows version. Database must be accessible via network for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full control of the database, exfiltrate sensitive data, execute arbitrary code on connected POSIM EVO clients, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized database access leading to data theft, manipulation of transaction records, and potential financial fraud.

🟢

If Mitigated

Limited impact if database is isolated behind firewalls, but credentials remain exposed in the application.

🌐 Internet-Facing: HIGH - If the database is accessible from the internet, attackers can directly exploit the hardcoded credentials.
🏢 Internal Only: HIGH - Even internally, any user with network access to the database can exploit these credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only knowledge of the hardcoded credentials and network access to the database.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No vendor advisory found

Restart Required: No

Instructions:

No official patch available. Contact POSIM vendor for updated version or guidance.

🔧 Temporary Workarounds

Change Database Credentials

all

Change the root database password and update the application configuration to use new credentials.

ALTER USER 'root'@'%' IDENTIFIED BY 'new_strong_password';

Network Segmentation

all

Restrict database access to only the POSIM EVO application server using firewall rules.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the database from untrusted networks
  • Monitor database access logs for unauthorized root user connections

🔍 How to Verify

Check if Vulnerable:

Check if POSIM EVO version is 15.13 and examine application configuration files for hardcoded database credentials.

Check Version:

Check POSIM EVO application version in the software interface or configuration files.

Verify Fix Applied:

Verify that database credentials have been changed and are no longer hardcoded in the application.

📡 Detection & Monitoring

Log Indicators:

  • Failed or successful database authentication attempts using root user
  • Unusual database queries from unexpected sources

Network Indicators:

  • Database connection attempts on default ports (3306 for MySQL) from unauthorized IPs

SIEM Query:

source="database_logs" user="root" AND (action="connect" OR action="query") | stats count by src_ip

🔗 References

📤 Share & Export