First published: Mon Jul 25 2022(Updated: )
This vulnerability allows remote attackers to bypass authentication on affected installations of Inductive Automation Ignition 8.1.15 (b2022030114). Authentication is not required to exploit this vulnerability. The specific flaw exists within com.inductiveautomation.ignition.gateway.web.pages. The issue results from the lack of proper authentication prior to access to functionality. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-17211.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Inductive Automation Ignition | =8.1.15 | |
Inductive Automation Ignition 8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35869 is a critical vulnerability that allows remote attackers to bypass authentication.
To fix CVE-2022-35869, users should upgrade to a patched version of Inductive Automation Ignition.
CVE-2022-35869 exploits a flaw in the authentication mechanism of Inductive Automation Ignition 8.1.15.
Yes, CVE-2022-35869 can be exploited remotely without the need for authentication.
CVE-2022-35869 affects Inductive Automation Ignition version 8.1.15.