CVE-2020-13501

9.8 CRITICAL

📋 TL;DR

This is an unauthenticated SQL injection vulnerability in eDNA Enterprise Data Historian's CHaD.asmx web service. Attackers can send specially crafted SOAP requests to execute arbitrary SQL commands, potentially compromising the database. Organizations using affected versions of eDNA Enterprise Data Historian are at risk.

💻 Affected Systems

Products:
  • eDNA Enterprise Data Historian
Versions: 3.0.1.2 and 7.5.4989.33053
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation of affected versions. The CHaD.asmx web service is typically exposed by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data exfiltration, modification, or deletion; potential for full system takeover via SQL injection to RCE if database permissions allow.

🟠

Likely Case

Data theft from the historian database, including sensitive industrial process data, configuration information, and potentially credentials.

🟢

If Mitigated

Limited impact if proper network segmentation, web application firewalls, and input validation are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has publicly available proof-of-concept code. Attackers can exploit this with standard SQL injection tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.6.0.0 or later

Vendor Advisory: https://us-cert.cisa.gov/ics/advisories/icsa-20-254-01

Restart Required: Yes

Instructions:

1. Download and install eDNA Enterprise Data Historian version 7.6.0.0 or later from GE Digital. 2. Restart the eDNA services. 3. Verify the patch is applied by checking the version.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to the eDNA web service to only trusted internal networks.

Configure firewall rules to block external access to port 80/443 on eDNA server

Web Application Firewall

all

Deploy a WAF with SQL injection protection rules in front of the eDNA web service.

Configure WAF to block requests containing SQL injection patterns

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate eDNA systems from untrusted networks
  • Deploy a web application firewall with SQL injection detection and prevention rules

🔍 How to Verify

Check if Vulnerable:

Check if the CHaD.asmx endpoint responds to SOAP requests with SQL injection payloads in the InstanceName parameter. Use tools like sqlmap with caution in production environments.

Check Version:

Check the eDNA installation directory or use the eDNA management console to view version information.

Verify Fix Applied:

Verify the eDNA version is 7.6.0.0 or later and test that SQL injection payloads no longer execute successfully.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts or SQL errors in web server logs
  • SOAP requests with suspicious parameters containing SQL keywords

Network Indicators:

  • Unusual outbound database connections from the eDNA server
  • SQL injection patterns in HTTP traffic to CHaD.asmx

SIEM Query:

source="web_server" AND (url="*CHaD.asmx*" AND (param="*InstanceName*" AND value="*SELECT* OR *UNION* OR *--*"))

🔗 References

📤 Share & Export