Lucene search

K
nessusThis script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.SCADA_INDUCTIVE_AUTOMATION_IGNITION_8_0_10.NBIN
HistoryJun 11, 2020 - 12:00 a.m.

Inductive Automation Ignition 8.x < 8.0.10 Multiple Vulnerabilities

2020-06-1100:00:00
This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
33

The version of Inductive Automation Ignition running on the remote host is affected by multiple vulnerabilities :

  • A denial of service (DoS) vulnerability exists due to an unprotected logging route when the Perspective Module is running. An unauthenticated, remote attacker can exploit this, via a series of specially crafted messages, to write endless log statements into the database without space limits, which can results in consuming the entire available hard-disk space.
    (CVE-2020-10641)

  • A deserialization vulnerability exists due to the lack of proper validation of user-supplied data. An unauthenticated, remote attacker can exploit this to execute arbitrary code in the context of SYSTEM. (CVE-2020-10644, CVE-2020-12000)

  • An information disclosure vulnerability exists in the getDiffs method of the com.inductiveautomation.ignition.gateway.servlets. gateway.functions.ProjectDownload class due to the lack of proper authentication required to query the server. An unauthenticated, remote attacker can exploit this to disclose potentially sensitive information. (CVE-2020-12004)

Binary data scada_inductive_automation_ignition_8_0_10.nbin
VendorProductVersionCPE
inductiveautomationignitioncpe:/a:inductiveautomation:ignition
Related for SCADA_INDUCTIVE_AUTOMATION_IGNITION_8_0_10.NBIN