First published: Mon Apr 18 2022(Updated: )
A remote attacker with write access to PI ProcessBook files could inject code that is imported into OSIsoft PI Vision 2020 versions prior to 3.5.0. Unauthorized information disclosure, modification, or deletion is also possible if a victim views or interacts with the infected display. This vulnerability affects PI System data and other data accessible with victim’s user permissions.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
OSIsoft PI Vision | <2020 | |
OSIsoft CRITICAL INFRASTRUCTURE SECTORS: Multiple | ||
OSIsoft COUNTRIES/AREAS DEPLOYED: Worldwide | ||
OSIsoft COMPANY HEADQUARTERS LOCATION: United States |
OSIsoft released PI Vision 2020 Version 3.5.0, which resolves these vulnerabilities. Recommended defensive measures and related configuration settings are described on the OSIsoft customer portal (Login required).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25163 is a vulnerability that allows a remote attacker with write access to PI ProcessBook files to inject code into OSIsoft PI Vision 2020 versions prior to 3.5.0.
CVE-2020-25163 allows unauthorized information disclosure, modification, or deletion if a victim views or interacts with an infected display in OSIsoft PI Vision 2020.
CVE-2020-25163 has a severity rating of 7.3, which is considered high.
An attacker with write access to PI ProcessBook files can inject malicious code, which is then imported into OSIsoft PI Vision displays.
Yes, a fix for CVE-2020-25163 is available in OSIsoft PI Vision version 3.5.0 and later.