CVE-2020-14479
Inductive Automation Ignition vulnerability analysis and mitigation

Overview

CVE-2020-14479 is a security vulnerability affecting Inductive Automation Ignition software versions 7.0.0 through 7.9.14 and 8.0.1 through 8.0.10. The vulnerability was disclosed in July 2020 and stems from missing authentication for critical function, where sensitive information can be obtained through the handling of serialized data due to lack of proper authentication required to query the server (CISA Advisory).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 5.3 (Medium) with the vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). It is classified under CWE-306 (Missing Authentication for Critical Function). The vulnerability is network-accessible with low attack complexity, requires no privileges or user interaction, and can result in low confidentiality impact (CISA Advisory).

Impact

Successful exploitation of this vulnerability could allow an attacker to obtain sensitive information through unauthorized server queries. The vulnerability affects critical infrastructure sectors including Critical Manufacturing, Energy, and Information Technology, primarily deployed in the United States (CISA Advisory).

Mitigation and workarounds

As of July 2020, there was no direct fix available for CVE-2020-14479. Inductive Automation planned to address this vulnerability in future product versions. In the interim, it is recommended to restrict interaction with the service to trusted machines only. Organizations should implement firewall rules and allow listing to ensure that only clients and servers with legitimate procedural relationships can communicate with the service. Additionally, CISA recommends minimizing network exposure for all control system devices and ensuring they are not accessible from the Internet (CISA Advisory).

Additional resources


SourceThis report was generated using AI

Related Inductive Automation Ignition vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-50233HIGH8.8
  • Inductive Automation IgnitionInductive Automation Ignition
  • cpe:2.3:a:inductiveautomation:ignition
NoYesMay 03, 2024
CVE-2023-50232HIGH8.8
  • Inductive Automation IgnitionInductive Automation Ignition
  • cpe:2.3:a:inductiveautomation:ignition
NoYesMay 03, 2024
CVE-2023-50223HIGH8.8
  • Inductive Automation IgnitionInductive Automation Ignition
  • cpe:2.3:a:inductiveautomation:ignition
NoYesMay 03, 2024
CVE-2023-50222HIGH8.8
  • Inductive Automation IgnitionInductive Automation Ignition
  • cpe:2.3:a:inductiveautomation:ignition
NoYesMay 03, 2024
CVE-2023-50221HIGH8.8
  • Inductive Automation IgnitionInductive Automation Ignition
  • cpe:2.3:a:inductiveautomation:ignition
NoYesMay 03, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management