CVE-2021-3604
📋 TL;DR
CVE-2021-3604 is a critical SQL injection vulnerability in Primion Digitek Secure 8 (Evalos) that allows remote attackers to extract sensitive user and administrator account data from the database. Organizations using affected versions of this industrial control system software are at risk of credential theft and potential system compromise.
💻 Affected Systems
- Primion Digitek Secure 8 (Evalos)
📦 What is this software?
Secure 8 by Primion Digitek
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the ICS system, credential theft leading to lateral movement within industrial networks, potential manipulation of industrial processes, and data exfiltration.
Likely Case
Extraction of administrator credentials and user data, enabling further attacks on the ICS network and potential unauthorized access to industrial control systems.
If Mitigated
Limited impact with proper input validation, network segmentation, and monitoring in place, though the vulnerability still presents a significant risk.
🎯 Exploit Status
Blind SQL injection typically requires more effort than regular SQLi but is still relatively straightforward for skilled attackers. The vulnerability is remotely exploitable without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Specific version not provided in references - contact vendor for patched version
Vendor Advisory: https://www.incibe-cert.es/en/early-warning/ics-advisories/primion-digitek-secure-8-sql-injection-vulnerability
Restart Required: Yes
Instructions:
1. Contact Primion Digitek for the security patch. 2. Apply the patch following vendor instructions. 3. Restart affected systems. 4. Verify the fix is properly applied.
🔧 Temporary Workarounds
Network Segmentation
allIsolate Secure 8 systems from untrusted networks and implement strict firewall rules
Web Application Firewall
allDeploy WAF with SQL injection protection rules to block exploitation attempts
🧯 If You Can't Patch
- Implement strict network segmentation to isolate affected systems from untrusted networks
- Deploy intrusion detection systems and monitor for SQL injection patterns in network traffic
🔍 How to Verify
Check if Vulnerable:
Test for SQL injection vulnerabilities using authorized penetration testing tools against the Secure 8 interface
Check Version:
Check system version through Secure 8 administration interface or contact vendor
Verify Fix Applied:
Re-test for SQL injection after patch application and verify no database errors or data leakage occurs
📡 Detection & Monitoring
Log Indicators:
- Unusual database queries
- SQL syntax errors in application logs
- Multiple failed login attempts followed by unusual queries
Network Indicators:
- SQL injection patterns in HTTP requests
- Unusual database connection patterns
- Data exfiltration patterns
SIEM Query:
source="secure8" AND ("sql" OR "database" OR "union select" OR "sleep(" OR "waitfor delay")
🔗 References
- http://titaniumaics.blogspot.com/2021/06/vulnerabilidad-zero-day-en-primion.html
- https://www.incibe-cert.es/en/early-warning/ics-advisories/primion-digitek-secure-8-sql-injection-vulnerability
- http://titaniumaics.blogspot.com/2021/06/vulnerabilidad-zero-day-en-primion.html
- https://www.incibe-cert.es/en/early-warning/ics-advisories/primion-digitek-secure-8-sql-injection-vulnerability