Inductive Automation Patches Ignition

Wednesday, April 1, 2015 @ 02:04 PM gHale


Inductive Automation produced a patch that mitigates several vulnerabilities in its Ignition Software, according to a report on ICS-CERT.

These vulnerabilities, discovered by Evgeny Druzhinin, Alexey Osipov, Ilya Karpov, and Gleb Gritsai of Positive Technologies, are not remotely exploitable.

RELATED STORIES
Schneider Patches InduSoft, InTouch Holes
GE, MACTek Update DTM Fix
Rockwell Fixes FactoryTalk Holes
Johnson Controls Fixes Metasys Holes

Inductive Automation Ignition 7.7.2 suffers from the issues.

Inductive Automation is a Folsom, CA-based supplier of web-based industrial automation software.

The affected product, Ignition, is an updated version of FactoryPMI. Ignition is a human-machine interface/SCADA product used in a variety of industrial applications. Ignition works across several sectors including communications, energy, food and agriculture, and water and wastewater systems. Inductive Automation estimates said this product sees use primarily in North and South America, Europe, Australia, and across Asia.

An attacker may cause dangerous content to execute through a vulnerable web application. The server reads data directly from the HTTP request and reflects it back in the HTTP response.

CVE-2015-0976 is the case number assigned to this vulnerability, which has a CVSS v2 base score of 5.9.

Another vulnerability fixed is an information exposure through error message. This page contains an error/warning message that may disclose sensitive information. The message can also contain the location of the file that produced the unhandled exception.

CVE-2015-0991 is the case number assigned to this vulnerability, which has a CVSS v2 base score of 5.0.

There is also an insecure storage of sensitive information hole. The OPC Server username and password stored in setting file is in clear text.

CVE-2015-0992 is the case number assigned to this vulnerability, which has a CVSS v2 base score of 5.2.

There is also an insufficient session expiration vulnerability. After user logs out, the session does not remove. This could lead to session reuse by attacker with privileges of the same user.

CVE-2015-0993 is the case number assigned to this vulnerability, which has a CVSS v2 base score of 5.5.

In addition, the mechanism of blocking brute force attacks could end up bypassed with resetting session id parameter in HTTP request.

CVE-2015-0994 is the case number assigned to this vulnerability, which has a CVSS v2 base score of 4.6.

Also, database storage of accounts by default in Windows and Database storage of accounts by default in Linux. Used hash algorithm – MD5, is vulnerable to brute force attacks and not considered secure.

CVE-2015-0995 is the case number assigned to this vulnerability, which has a CVSS v2 base score of 9.0.

These vulnerabilities are not exploitable remotely and cannot end up exploited without user interaction. The exploit only triggers when a local user runs the vulnerable application and loads the malformed URL to the JNLP.

Exploits that target these vulnerabilities are not publicly available. An attacker with a low skill would be able to exploit these vulnerabilities.

Inductive Automation created a patch for these vulnerabilities and recommends updating as soon as possible.



Leave a Reply

You must be logged in to post a comment.