CVE-2018-17901
moderate-risk
Published 2018-10-17
LAquis SCADA Versions 4.1.0.3870 and prior, when processing project files the application fails to sanitize user input prior to performing write operations on a stack object, which may allow an attacker to execute code under the current process.
Do I need to act?
-
0.29% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (1)
Affected Vendors
References (5)
Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/151421
Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01
30
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal