CVE-2025-9139

4.3 MEDIUM

📋 TL;DR

This vulnerability in Scada-LTS 2.7.8.1 allows information disclosure through the /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr endpoint. Attackers can remotely access sensitive data, though the vendor states exploitation likely requires admin permissions. Organizations using Scada-LTS 2.7.8.1 are affected.

💻 Affected Systems

Products:
  • Scada-LTS
Versions: 2.7.8.1
Operating Systems: Any OS running Scada-LTS
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the WatchListDwr.init.dwr endpoint functionality; exploitation likely requires admin permissions according to vendor.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive operational data from SCADA systems could be exposed to attackers, potentially revealing critical infrastructure details or user information.

🟠

Likely Case

Limited information disclosure affecting users with admin access, as the vendor indicates exploitation requires elevated permissions.

🟢

If Mitigated

Minimal impact if proper access controls and network segmentation are implemented, restricting exposure to trusted users only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Proof of concept is publicly available; vendor states exploitation likely requires admin permissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor for specific patched version

Vendor Advisory: Not provided in CVE details

Restart Required: No

Instructions:

1. Check vendor website for security updates. 2. Apply the latest patch for Scada-LTS. 3. Verify the patch addresses CVE-2025-9139.

🔧 Temporary Workarounds

Restrict Access to DWR Endpoint

all

Block or restrict access to the vulnerable /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr endpoint using web server configuration or firewall rules.

# Example for Apache: RewriteRule ^/Scada-LTS/dwr/call/plaincall/WatchListDwr\.init\.dwr$ - [F]
# Example for Nginx: location ~ ^/Scada-LTS/dwr/call/plaincall/WatchListDwr\.init\.dwr$ { return 403; }

Implement Network Segmentation

all

Isolate Scada-LTS systems from untrusted networks and restrict access to authorized users only.

# Configure firewall rules to limit access to Scada-LTS server IP and ports

🧯 If You Can't Patch

  • Implement strict access controls to ensure only trusted administrators can access the Scada-LTS system.
  • Monitor network traffic and logs for unauthorized access attempts to the vulnerable endpoint.

🔍 How to Verify

Check if Vulnerable:

Check if Scada-LTS version is 2.7.8.1 and the /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr endpoint is accessible.

Check Version:

Check Scada-LTS web interface or configuration files for version information.

Verify Fix Applied:

Verify the Scada-LTS version is updated beyond 2.7.8.1 and test if the endpoint no longer discloses sensitive information.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr endpoint
  • Failed or successful authentication attempts from unexpected sources

Network Indicators:

  • HTTP requests to /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr from unauthorized IPs

SIEM Query:

source="web_server" AND uri="/Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr"

🔗 References

📤 Share & Export