CVE-2023-1064

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Uzay Baskul Weighbridge Automation Software allows attackers to execute arbitrary SQL commands on the database. It affects all versions before 1.1, potentially compromising weighbridge systems used in industrial weighing operations.

💻 Affected Systems

Products:
  • Uzay Baskul Weighbridge Automation Software
Versions: All versions before 1.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Weighbridge systems are typically used in industrial settings like ports, mines, and logistics centers for vehicle weighing.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, manipulation of weighing records, system takeover, and potential physical safety risks if weighbridge controls are affected.

🟠

Likely Case

Data exfiltration including sensitive business information, manipulation of weighing transactions, and potential financial fraud through altered weight records.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only error messages or limited data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are typically easy to exploit with basic tools like sqlmap. The CVE description suggests improper input neutralization, indicating classic SQLi.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-23-0115

Restart Required: Yes

Instructions:

1. Download version 1.1 from official vendor sources. 2. Backup current configuration and data. 3. Install the update following vendor instructions. 4. Restart the application and verify functionality.

🔧 Temporary Workarounds

Input Validation at Application Layer

all

Implement strict input validation to reject SQL special characters in user inputs

Database Permission Reduction

all

Limit database user permissions to only necessary operations (SELECT, INSERT) rather than full admin rights

🧯 If You Can't Patch

  • Isolate the weighbridge system on a separate network segment with strict firewall rules
  • Implement a web application firewall (WAF) with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check software version in application interface or configuration files. If version is below 1.1, system is vulnerable.

Check Version:

Check application 'About' section or configuration files for version information

Verify Fix Applied:

Confirm version is 1.1 or higher in application interface and test SQL injection attempts are properly blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts with SQL syntax
  • Unexpected database queries

Network Indicators:

  • SQL syntax in HTTP POST/GET parameters
  • Unusual database connection patterns
  • Requests with SQL keywords (SELECT, UNION, etc.)

SIEM Query:

source="weighbridge_logs" AND ("SQL" OR "syntax" OR "union" OR "select")

🔗 References

📤 Share & Export