CVE-2023-38122

Inductive Automation Ignition OPC UA Quick Client Permissive Cross-domain Policy Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the configuration of the web server. The issue results from the lack of appropriate Content Security Policy headers. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of SYSTEM. Was ZDI-CAN-20539.
Configurations

Configuration 1 (hide)

cpe:2.3:a:inductiveautomation:ignition:*:*:*:*:*:*:*:*

History

12 Mar 2025, 14:36

Type Values Removed Values Added
First Time Inductiveautomation ignition
Inductiveautomation
CPE cpe:2.3:a:inductiveautomation:ignition:*:*:*:*:*:*:*:*
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
References () https://inductiveautomation.com/blog/inductive-automation-participates-in-pwn2own-to-strengthen-ignition-security - () https://inductiveautomation.com/blog/inductive-automation-participates-in-pwn2own-to-strengthen-ignition-security - Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-23-1013/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-1013/ - Third Party Advisory

03 May 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-03 02:15

Updated : 2025-03-12 14:36


NVD link : CVE-2023-38122

Mitre link : CVE-2023-38122


JSON object : View

Products Affected

inductiveautomation

  • ignition