CVE-2022-35869
Inductive Automation Ignition vulnerability analysis and mitigation

Overview

The CVE-2022-35869 is an authentication bypass vulnerability affecting Inductive Automation Ignition version 8.1.15. This vulnerability was discovered during the Pwn2Own 2022 competition at the S4x22 conference by researcher @sn_t from @pentestltd. The vulnerability exists within the com.inductiveautomation.ignition.gateway.web.pages component and allows remote attackers to bypass authentication on affected installations without requiring prior authentication (ZDI Advisory).

Technical details

The vulnerability stems from the lack of proper authentication prior to access to functionality in the Gateway Web Interface. The issue was assessed as a critical privilege escalation vulnerability as it grants an attacker privileged access to the Ignition Gateway Config Page. The vulnerability received a CVSS v3.1 base score of 9.8 CRITICAL (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) from NVD, while Zero Day Initiative rated it at 7.5 HIGH (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) (NVD).

Impact

The successful exploitation of this vulnerability allows attackers to bypass authentication on the system, specifically granting unauthorized access to the Ignition Gateway Config Page. This access could potentially lead to further system compromise as it provides privileged access to critical gateway configurations (Vendor Advisory).

Mitigation and workarounds

Inductive Automation has released patches to address this vulnerability in versions 8.1.17 and 7.9.20. The vendor recommends that all customers upgrade to these versions or greater to protect their systems from this vulnerability. Additionally, customers should follow the Ignition Security Hardening Guide recommendations for environment configuration, including Defense in Depth strategies (Vendor Advisory).

Community reactions

The vulnerability was discovered during the ICS Pwn2Own competition at S4x22 conference, where Ignition was registered in the Control Server category as one of 10 products selected as competition attack targets. The discovery was part of a larger competition that resulted in 32 entries registered by 11 contestants, with 6 entries specifically targeting Ignition (Vendor Advisory).

Additional resources


SourceThis report was generated using AI

Related Inductive Automation Ignition vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-50233HIGH8.8
  • Inductive Automation IgnitionInductive Automation Ignition
  • cpe:2.3:a:inductiveautomation:ignition
NoYesMay 03, 2024
CVE-2023-50232HIGH8.8
  • Inductive Automation IgnitionInductive Automation Ignition
  • cpe:2.3:a:inductiveautomation:ignition
NoYesMay 03, 2024
CVE-2023-50223HIGH8.8
  • Inductive Automation IgnitionInductive Automation Ignition
  • cpe:2.3:a:inductiveautomation:ignition
NoYesMay 03, 2024
CVE-2023-50222HIGH8.8
  • Inductive Automation IgnitionInductive Automation Ignition
  • cpe:2.3:a:inductiveautomation:ignition
NoYesMay 03, 2024
CVE-2023-50221HIGH8.8
  • Inductive Automation IgnitionInductive Automation Ignition
  • cpe:2.3:a:inductiveautomation:ignition
NoYesMay 03, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management