First published: Mon Jul 25 2022(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition 8.1.15 (b2022030114). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of ZIP files. Crafted data in a ZIP file can cause the application to execute arbitrary Python scripts. The user interface fails to provide sufficient indication of the hazard. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-16949.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Inductive Automation Ignition 8 | ||
Inductive Automation Ignition | =8.1.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35873 is rated as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2022-35873, update Inductive Automation Ignition to version 8.1.16 or later.
CVE-2022-35873 can be exploited through malicious files or web pages that the user interacts with.
Yes, user interaction is required for the exploitation of CVE-2022-35873.
CVE-2022-35873 affects the Inductive Automation Ignition version 8.1.15.