CVE-2023-38123

Inductive Automation Ignition OPC UA Quick Client Missing Authentication for Critical Function Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Inductive Automation Ignition. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the server configuration. The issue results from the lack of authentication prior to allowing access to password change functionality. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-20540.
Configurations

Configuration 1 (hide)

cpe:2.3:a:inductiveautomation:ignition:*:*:*:*:*:*:*:*

History

13 Mar 2025, 21:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 8.8
CPE cpe:2.3:a:inductiveautomation:ignition:*:*:*:*:*:*:*:*
First Time Inductiveautomation ignition
Inductiveautomation
References () https://inductiveautomation.com/blog/inductive-automation-participates-in-pwn2own-to-strengthen-ignition-security - () https://inductiveautomation.com/blog/inductive-automation-participates-in-pwn2own-to-strengthen-ignition-security - Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-23-1014/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-1014/ - Third Party Advisory

Information

Published : 2024-05-03 02:15

Updated : 2025-03-13 21:44


NVD link : CVE-2023-38123

Mitre link : CVE-2023-38123

CVE.ORG link : CVE-2023-38123


JSON object : View

Products Affected

inductiveautomation

  • ignition
CWE
CWE-306

Missing Authentication for Critical Function