CVE-2023-38122

Inductive Automation Ignition OPC UA Quick Client Permissive Cross-domain Policy Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the configuration of the web server. The issue results from the lack of appropriate Content Security Policy headers. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of SYSTEM. Was ZDI-CAN-20539.
Configurations

Configuration 1 (hide)

cpe:2.3:a:inductiveautomation:ignition:*:*:*:*:*:*:*:*

History

12 Mar 2025, 14:36

Type Values Removed Values Added
First Time Inductiveautomation ignition
Inductiveautomation
CWE NVD-CWE-Other
References () https://inductiveautomation.com/blog/inductive-automation-participates-in-pwn2own-to-strengthen-ignition-security - () https://inductiveautomation.com/blog/inductive-automation-participates-in-pwn2own-to-strengthen-ignition-security - Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-23-1013/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-1013/ - Third Party Advisory
CPE cpe:2.3:a:inductiveautomation:ignition:*:*:*:*:*:*:*:*

Information

Published : 2024-05-03 02:15

Updated : 2025-03-12 14:36


NVD link : CVE-2023-38122

Mitre link : CVE-2023-38122

CVE.ORG link : CVE-2023-38122


JSON object : View

Products Affected

inductiveautomation

  • ignition
CWE
CWE-942

Permissive Cross-domain Policy with Untrusted Domains

NVD-CWE-Other