CVE-2025-9139
📋 TL;DR
This vulnerability in Scada-LTS 2.7.8.1 allows information disclosure through the /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr endpoint. Attackers can remotely access sensitive data, though the vendor states exploitation likely requires admin permissions. Organizations using Scada-LTS 2.7.8.1 are affected.
💻 Affected Systems
- Scada-LTS
📦 What is this software?
Scada Lts by Scada Lts
⚠️ Risk & Real-World Impact
Worst Case
Sensitive operational data from SCADA systems could be exposed to attackers, potentially revealing critical infrastructure details or user information.
Likely Case
Limited information disclosure affecting users with admin access, as the vendor indicates exploitation requires elevated permissions.
If Mitigated
Minimal impact if proper access controls and network segmentation are implemented, restricting exposure to trusted users only.
🎯 Exploit Status
Proof of concept is publicly available; vendor states exploitation likely requires admin permissions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor for specific patched version
Vendor Advisory: Not provided in CVE details
Restart Required: No
Instructions:
1. Check vendor website for security updates. 2. Apply the latest patch for Scada-LTS. 3. Verify the patch addresses CVE-2025-9139.
🔧 Temporary Workarounds
Restrict Access to DWR Endpoint
allBlock or restrict access to the vulnerable /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr endpoint using web server configuration or firewall rules.
# Example for Apache: RewriteRule ^/Scada-LTS/dwr/call/plaincall/WatchListDwr\.init\.dwr$ - [F]
# Example for Nginx: location ~ ^/Scada-LTS/dwr/call/plaincall/WatchListDwr\.init\.dwr$ { return 403; }
Implement Network Segmentation
allIsolate Scada-LTS systems from untrusted networks and restrict access to authorized users only.
# Configure firewall rules to limit access to Scada-LTS server IP and ports
🧯 If You Can't Patch
- Implement strict access controls to ensure only trusted administrators can access the Scada-LTS system.
- Monitor network traffic and logs for unauthorized access attempts to the vulnerable endpoint.
🔍 How to Verify
Check if Vulnerable:
Check if Scada-LTS version is 2.7.8.1 and the /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr endpoint is accessible.
Check Version:
Check Scada-LTS web interface or configuration files for version information.
Verify Fix Applied:
Verify the Scada-LTS version is updated beyond 2.7.8.1 and test if the endpoint no longer discloses sensitive information.
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr endpoint
- Failed or successful authentication attempts from unexpected sources
Network Indicators:
- HTTP requests to /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr from unauthorized IPs
SIEM Query:
source="web_server" AND uri="/Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr"
🔗 References
- https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/%20CVE-2025-9139.md
- https://vuldb.com/?ctiid.320519
- https://vuldb.com/?id.320519
- https://vuldb.com/?submit.621062
- https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/Sensitive%20User%20Information%20Disclosure%20via%20WatchListDwr.init.dwr%20Endpoint.md#proof-of-concept-poc
- https://vuldb.com/?submit.621062