LAquis SCADA Versions 4.1.0.3870 and prior, when processing project files the application fails to sanitize user input prior to performing write operations on a stack object, which may allow an attacker to execute code under the current process.
References
Link | Resource |
---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01 | Third Party Advisory US Government Resource |
http://laquisscada.com/instale1.php | Product Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/151421 | Third Party Advisory |
Configurations
Information
Published : 2018-10-16 19:29
Updated : 2019-10-09 16:37
NVD link : CVE-2018-17901
Mitre link : CVE-2018-17901
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
lcds
- laquis_scada