First published: Fri May 03 2024(Updated: )
Inductive Automation Ignition OPC UA Quick Client Missing Authentication for Critical Function Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Inductive Automation Ignition. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the server configuration. The issue results from the lack of authentication prior to allowing access to password change functionality. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-20540.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Inductive Automation Ignition 8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38123 has been classified as a critical severity vulnerability due to its potential for remote authentication bypass.
To fix CVE-2023-38123, users should update their Inductive Automation Ignition installations to the latest version that addresses this vulnerability.
CVE-2023-38123 allows remote attackers to bypass authentication, gaining unauthorized access to critical functions in Inductive Automation Ignition.
Yes, CVE-2023-38123 requires user interaction for the exploitation to succeed.
CVE-2023-38123 affects Inductive Automation Ignition specifically during the use of the OPC UA Quick Client.