Advisory Details

June 15th, 2020

(0Day) (Pwn2Own) Inductive Automation Ignition ServerMessageHeader Deserialization of Untrusted Data Information Disclosure Vulnerability

ZDI-20-714
ZDI-CAN-10277

CVE ID
CVSS SCORE 5.3, AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
AFFECTED VENDORS Inductive Automation
AFFECTED PRODUCTS Ignition
VULNERABILITY DETAILS

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Inductive Automation Ignition. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of serialized data. The issue results in the lack of proper authentication required to query to server. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of SYSTEM.

ADDITIONAL DETAILS

This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120 day deadline.

01/22/20 – ZDI disclosed the vulnerability report to the vendor onsite at Pwn2Own
04/22/20 – ZDI requested an update
04/23/20 – The vendor provided an update that the report was still in work
05/05/20 – ICS-CERT requested an update and the vendor replied no ETA was available
05/06/20 – ZDI agreed to wait until further notice
05/20/20 – ZDI requested an update and the vendor replied that there was no ETA
06/03/20 - ICS-CERT requested an update and the vendor replied no ETA was available
06/04/20 – ZDI notified the vendor and ICS-CERT that the report would be published as a 0-day advisory on 06/15/20

-- Mitigation:
Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the service to trusted machines. Only the clients and servers that have a legitimate procedural relationship with the service should be permitted to communicate with it. This could be accomplished in a number of ways, most notably with firewall rules/whitelisting.


DISCLOSURE TIMELINE
  • 2020-01-30 - Vulnerability reported to vendor
  • 2020-06-15 - Coordinated public release of advisory
CREDIT Chris Anastasio (muffin) and Steven Seeley (mr_me) of Incite Team
BACK TO ADVISORIES