Lucene search

K
srcinciteChris Anastasio (muffin) and Steven Seeley (mr_me) of Incite TeamSRC-2022-0013
HistoryApr 22, 2022 - 12:00 a.m.

SRC-2022-0013 : Inductive Automation Ignition GatewaySessionManagerImpl Authentication Bypass Vulnerability

2022-04-2200:00:00
Chris Anastasio (muffin) and Steven Seeley (mr_me) of Incite Team
srcincite.io
66
inductive automation
authentication bypass
gatewaysessionmanagerimpl

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

69.8%

Vulnerability Details:

This vulnerability allows remote attackers to bypass authentication on affected installations of Inductive Automation Ignition. Authentication is not required to exploit this vulnerability. The specific flaw exists within GatewaySessionManagerImpl class.

The issue results from the use of a fixed seed for session id generation when using the SecureRandom API. An attacker can leverage this vulnerability to predict an authenticated session and access the gateway.

Affected Vendors:

Inductive

Affected Products:

Inductive Automation Ignition

Vendor Response:

Inductive has issued an update to correct this vulnerability. More details can be found at: <https://support.inductiveautomation.com/hc/en-us/articles/7625759776653&gt;
Proof of Concept:
<https://github.com/sourceincite/randy&gt;

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

69.8%

Related for SRC-2022-0013