CVE-2018-17893

9.8 CRITICAL

📋 TL;DR

CVE-2018-17893 is a critical untrusted pointer dereference vulnerability in LAquis SCADA software that allows remote attackers to execute arbitrary code on affected systems. This affects LAquis SCADA versions 4.1.0.3870 and earlier, potentially compromising industrial control systems and SCADA networks.

💻 Affected Systems

Products:
  • LAquis SCADA
Versions: 4.1.0.3870 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Industrial control systems using LAquis SCADA for monitoring and control operations are particularly vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to gain full control of SCADA systems, manipulate industrial processes, cause physical damage, and pivot to other critical infrastructure systems.

🟠

Likely Case

Remote code execution leading to data theft, system disruption, ransomware deployment, or establishment of persistent access in industrial networks.

🟢

If Mitigated

Limited impact through network segmentation and proper access controls, potentially resulting in isolated system compromise without broader network access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows remote exploitation without authentication, making it attractive for attackers targeting industrial systems.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 4.1.0.3871 or later

Vendor Advisory: http://laquisscada.com/instale1.php

Restart Required: Yes

Instructions:

1. Download latest version from LAquis SCADA website 2. Backup current configuration 3. Install update 4. Restart SCADA services 5. Verify functionality

🔧 Temporary Workarounds

Network Segmentation

all

Isolate SCADA systems from corporate networks and internet access

Firewall Rules

windows

Restrict network access to SCADA systems using firewall rules

netsh advfirewall firewall add rule name="Block SCADA Ports" dir=in action=block protocol=TCP localport=80,443,502,20000-30000

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SCADA systems
  • Deploy intrusion detection systems specifically tuned for SCADA protocols

🔍 How to Verify

Check if Vulnerable:

Check LAquis SCADA version in Help > About menu or registry key: HKEY_LOCAL_MACHINE\SOFTWARE\LAquis SCADA\Version

Check Version:

reg query "HKLM\SOFTWARE\LAquis SCADA" /v Version

Verify Fix Applied:

Verify version is 4.1.0.3871 or later and test SCADA functionality

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process creation from SCADA executable
  • Network connections to SCADA system from unauthorized sources
  • Abnormal SCADA protocol traffic patterns

Network Indicators:

  • Unusual traffic to SCADA ports (502, 20000-30000)
  • Exploit attempts using crafted packets to SCADA services
  • Outbound connections from SCADA systems to suspicious IPs

SIEM Query:

source="scada_logs" AND (event_type="process_creation" AND process_name="laquis_scada.exe") OR (dest_port IN (502, 20000-30000) AND src_ip NOT IN (allowed_ips))

🔗 References

📤 Share & Export