First published: Fri Jul 24 2020(Updated: )
An authenticated remote attacker could crash PI Archive Subsystem when the subsystem is working under memory pressure. This can result in blocking queries to PI Data Archive (2018 SP2 and prior versions).
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
OSIsoft PI Data Archive | <=2019 | |
OSIsoft Applications using PI Asset Framework (AF) Client versions prior to and including PI AF Client 2018 SP3 Patch 1, Version 2.10.7.283 | ||
OSIsoft Applications using PI Software Development Kit (SDK) versions prior to and including PI SDK 2018 SP1, Version 1.4.7.602 | ||
OSIsoft PI API for Windows Integrated Security versions prior to and including 2.0.2.5, | ||
OSIsoft PI API versions prior to and including 1.6.8.26 | ||
OSIsoft PI Buffer Subsystem versions prior to and including 4.8.0.18 | ||
OSIsoft PI Connector for BACnet, versions prior to and including 1.2.0.6 | ||
OSIsoft PI Connector for CygNet, versions prior to and including 1.4.0.17 | ||
OSIsoft PI Connector for DC Systems RTscada, versions prior to and including 1.2.0.42 | ||
OSIsoft PI Connector for Ethernet/IP, versions prior to and including 1.1.0.10 | ||
OSIsoft PI Connector for HART-IP, versions prior to and including 1.3.0.1 | ||
OSIsoft PI Connector for Ping, versions prior to and including 1.0.0.54 | ||
OSIsoft PI Connector for Wonderware Historian, versions prior to and including 1.5.0.88 | ||
OSIsoft PI Connector Relay, versions prior to and including 2.5.19.0 | ||
OSIsoft PI Data Archive versions prior to and including PI Data Archive 2018 SP3, Version 3.4.430.460 | ||
OSIsoft PI Data Collection Manager, versions prior to and including 2.5.19.0 | ||
OSIsoft PI Integrator for Business Analytics versions prior to and including 2018 R2 SP1, Version 2.2.0.183 | ||
OSIsoft PI Interface Configuration Utility (ICU) versions prior to and including 1.5.0.7 | ||
OSIsoft PI to OCS versions prior to and including 1.1.36.0 |
Fully configure Windows authentication for the PI System and disable legacy authentication methods. For a starting point on PI System security best practices, see knowledge base article KB00833 -Seven best practices for securing your PI Server. (https://customers.osisoft.com/s/knowledgearticle?knowledgeArticleUrl=KB00833)
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.