Discover the details of CVE-2021-32989, a critical cross-site scripting vulnerability in LCDS LAquis SCADA application version <= 4.3.1.1011. Learn about the impact, affected systems, and mitigation steps.
When a non-existent resource is requested, the LCDS LAquis SCADA application (version 4.3.1.1011 and prior) returns error messages which may allow reflected cross-site scripting.
Understanding CVE-2021-32989
This CVE-2021-32989 is related to a cross-site scripting vulnerability in the LCDS LAquis SCADA application.
What is CVE-2021-32989?
CVE-2021-32989 is a vulnerability that occurs in the LCDS LAquis SCADA software when error messages are returned for non-existent resources. This behavior can lead to potential reflected cross-site scripting attacks.
The Impact of CVE-2021-32989
The impact of this vulnerability is rated as critical with a CVSS base score of 9.3. It could result in high integrity impact while requiring no special privileges for exploitation.
Technical Details of CVE-2021-32989
This section covers the specific technical details of the CVE.
Vulnerability Description
The vulnerability allows for reflected cross-site scripting when the application responds with error messages for non-existent resources.
Affected Systems and Versions
The affected product is "LAquis SCADA" developed by "LCDS—Leão Consultoria e Desenvolvimento de Sistemas Ltda ME" with versions equal to or less than 4.3.1.1011.
Exploitation Mechanism
The vulnerability can be exploited over the network with low attack complexity and without user interaction, making it easier to exploit.
Mitigation and Prevention
Here are the steps to mitigate and prevent exploitation of CVE-2021-32989:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure that you install the latest patches released by the vendor to address this vulnerability.