CVE-2021-41579

7.8 HIGH

📋 TL;DR

This vulnerability in LCDS LAquis SCADA allows attackers to bypass security controls and write arbitrary files to the operating system through path traversal when a malicious project file is loaded and played. It affects users of LAquis SCADA through version 4.3.1.1085 and can lead to remote code execution.

💻 Affected Systems

Products:
  • LCDS LAquis SCADA
Versions: Through 4.3.1.1085
Operating Systems: Windows (primary SCADA platform)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user to load malicious .els project file and use play feature, but default configuration does not prevent this.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining code execution at the user's privilege level, potentially leading to lateral movement, data theft, or ransomware deployment.

🟠

Likely Case

Local file system manipulation leading to privilege escalation, persistence mechanisms, or data corruption.

🟢

If Mitigated

Limited impact with proper user awareness training and restricted permissions preventing file writes to critical locations.

🌐 Internet-Facing: MEDIUM - Requires user interaction to load malicious file, but SCADA systems often have internet exposure for remote management.
🏢 Internal Only: HIGH - Internal users with access to SCADA systems could exploit this for lateral movement within industrial networks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires social engineering to get victim to load malicious file, but technical exploitation is straightforward once file is loaded.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 4.3.1.1085

Vendor Advisory: https://github.com/jacob-baines/vuln_disclosure/blob/main/vuln_2021_04.txt

Restart Required: Yes

Instructions:

1. Contact LCDS for updated version. 2. Backup current configuration. 3. Install updated version. 4. Restart SCADA services. 5. Verify functionality.

🔧 Temporary Workarounds

Restrict Project File Loading

windows

Implement policies to only load project files from trusted sources and disable automatic execution features.

User Account Control

windows

Run SCADA software with limited user privileges to restrict file write capabilities to sensitive locations.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SCADA systems from general corporate networks
  • Deploy application whitelisting to prevent execution of unauthorized files and scripts

🔍 How to Verify

Check if Vulnerable:

Check LAquis SCADA version in Help > About menu. If version is 4.3.1.1085 or earlier, system is vulnerable.

Check Version:

Check via GUI: Help > About in LAquis SCADA application

Verify Fix Applied:

Verify version is greater than 4.3.1.1085 and test loading project files with path traversal attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations in system directories
  • Multiple failed attempts to access restricted paths
  • Loading of .els project files from untrusted sources

Network Indicators:

  • Unexpected file transfers to/from SCADA systems
  • Anomalous network connections following project file loading

SIEM Query:

source="windows_security" AND (event_id=4656 OR event_id=4663) AND object_name="*\*.els" AND process_name="*laquis*"

🔗 References

📤 Share & Export