CVE-2021-32989

9.3 CRITICAL

📋 TL;DR

This reflected cross-site scripting (XSS) vulnerability in LAquis SCADA allows attackers to inject malicious scripts via error messages when requesting non-existent resources. Attackers can execute arbitrary JavaScript in victims' browsers, potentially stealing credentials or performing actions on their behalf. Organizations using LAquis SCADA version 4.3.1.1011 or earlier are affected.

💻 Affected Systems

Products:
  • LAquis SCADA
Versions: 4.3.1.1011 and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the web interface component that handles error messages for non-existent resource requests.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal SCADA operator credentials, gain unauthorized access to industrial control systems, manipulate HMI displays, or disrupt industrial operations through client-side attacks.

🟠

Likely Case

Attackers craft malicious URLs containing XSS payloads, trick operators into clicking them, then steal session cookies or credentials to gain unauthorized access to the SCADA system.

🟢

If Mitigated

With proper network segmentation, web application firewalls, and operator training about suspicious links, impact is limited to isolated browser sessions without system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly exploited and require minimal technical skill. Attackers need to trick users into clicking malicious links.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 4.3.1.1012 or later

Vendor Advisory: https://www.cisa.gov/uscert/ics/advisories/icsa-21-208-04

Restart Required: Yes

Instructions:

1. Download updated version from LAquis SCADA vendor. 2. Backup current configuration and data. 3. Install the update following vendor instructions. 4. Restart the SCADA system and verify functionality.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with XSS protection rules to filter malicious requests before they reach the SCADA application.

Input Validation Enhancement

all

Implement additional input validation at network perimeter devices or reverse proxies to sanitize user input.

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to restrict script execution sources
  • Segment SCADA network from corporate network and restrict web interface access to authorized operators only

🔍 How to Verify

Check if Vulnerable:

Test by accessing the SCADA web interface and requesting a non-existent resource with a basic XSS payload like <script>alert('test')</script> in the URL parameters.

Check Version:

Check Help > About in LAquis SCADA interface or examine installed program version in Windows Control Panel

Verify Fix Applied:

After patching, repeat the vulnerability test. The application should properly sanitize input and not execute the script.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing script tags or JavaScript code in URL parameters
  • Multiple 404 errors with suspicious parameter values
  • Unusual user agent strings or referrer headers

Network Indicators:

  • HTTP requests with encoded script payloads in query strings
  • Traffic patterns showing users accessing unusual resource paths

SIEM Query:

source="web_server_logs" AND (status=404 AND (url="*<script*" OR url="*javascript:*" OR url="*onerror=*"))

🔗 References

📤 Share & Export