First published: Wed Feb 21 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. User interaction is required to exploit this vulnerability in that the target must connect to a malicious server. The specific flaw exists within the getParams method. The issue results from the lack of proper validation of a user-supplied string before using it to prepare an argument for a system call. An attacker can leverage this vulnerability to execute code in the context of the current user.
Affected Software | Affected Version | How to fix |
---|---|---|
Inductive Automation Ignition 8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-22028 is categorized as a critical vulnerability due to the potential for remote code execution.
To fix ZDI-CAN-22028, users should update their Inductive Automation Ignition software to the latest available version that includes patches.
ZDI-CAN-22028 affects installations of Inductive Automation Ignition that have not been updated to include the necessary security fixes.
Exploitation of ZDI-CAN-22028 can allow attackers to execute arbitrary code on the affected systems, leading to unauthorized access or control.
Yes, user interaction is required as the target must connect to a malicious server for the vulnerability to be exploited.