ID

VAR-202006-0006


CVE

CVE-2020-10644


TITLE

Inductive Automation Made Ignition Multiple vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2020-004797

DESCRIPTION

The affected product lacks proper validation of user-supplied data, which can result in deserialization of untrusted data on the Ignition 8 Gateway (versions prior to 8.0.10) and Ignition 7 Gateway (versions prior to 7.9.14), allowing an attacker to obtain sensitive information. Ignition Is Inductive Automation Industrial software provided by. Ignition Is vulnerable to several vulnerabilities: * Lack of authentication for important features (CWE-306) - CVE-2020-12004, CVE-2020-14479 * Deserialize untrusted data (CWE-502) - CVE-2020-10644, CVE-2020-12000The expected impact depends on each vulnerability, but it may be affected as follows. * Confidential information is stolen by a remote third party because authentication is not performed when requesting a query to the server - CVE-2020-12004, CVE-2020-14479 * Inadequate validation of serialized data deserializes untrusted data provided by a remote third party and executes arbitrary code with system privileges - CVE-2020-10644, CVE-2020-12000. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is not required to exploit this vulnerability.The specific flaw exists with the handling of project diffs. An attacker can leverage this to execute code in the context of SYSTEM. The platform supports SCADA (Data Acquisition and Monitoring System), HMI (Human Machine Interface), etc. Attackers can use this vulnerability to obtain sensitive information

Trust: 3.24

sources: NVD: CVE-2020-10644 // JVNDB: JVNDB-2020-004797 // ZDI: ZDI-20-686 // CNVD: CNVD-2020-34643 // IVD: 0243acd1-a6e8-498a-bb1d-677fa500ffe3 // IVD: 0df72e19-8991-452b-aa9e-dfb4039451cc // VULHUB: VHN-163143

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: 0243acd1-a6e8-498a-bb1d-677fa500ffe3 // IVD: 0df72e19-8991-452b-aa9e-dfb4039451cc // CNVD: CNVD-2020-34643

AFFECTED PRODUCTS

vendor:inductiveautomationmodel:ignition gatewayscope:ltversion:7.9.14

Trust: 1.0

vendor:inductiveautomationmodel:ignition gatewayscope:gteversion:7.2.4.48

Trust: 1.0

vendor:inductiveautomationmodel:ignition gatewayscope:ltversion:8.0.10

Trust: 1.0

vendor:inductiveautomationmodel:ignition gatewayscope:gteversion:8.0

Trust: 1.0

vendor:ignition gatewaymodel: - scope:eqversion:*

Trust: 0.8

vendor:inductive automationmodel:ignitionscope:eqversion:8.0.10

Trust: 0.8

vendor:inductive automationmodel:ignitionscope: - version: -

Trust: 0.7

vendor:inductivemodel:automation ignitionscope:ltversion:8.0.10

Trust: 0.6

vendor:inductivemodel:automation ignitionscope:ltversion:7.9.14

Trust: 0.6

sources: IVD: 0243acd1-a6e8-498a-bb1d-677fa500ffe3 // IVD: 0df72e19-8991-452b-aa9e-dfb4039451cc // ZDI: ZDI-20-686 // CNVD: CNVD-2020-34643 // JVNDB: JVNDB-2020-004797 // NVD: CVE-2020-10644

CVSS

SEVERITY

CVSSV2

CVSSV3

IPA: JVNDB-2020-004797
value: MEDIUM

Trust: 1.6

IPA: JVNDB-2020-004797
value: CRITICAL

Trust: 1.6

nvd@nist.gov: CVE-2020-10644
value: HIGH

Trust: 1.0

ZDI: CVE-2020-10644
value: CRITICAL

Trust: 0.7

CNVD: CNVD-2020-34643
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202005-1323
value: HIGH

Trust: 0.6

IVD: 0243acd1-a6e8-498a-bb1d-677fa500ffe3
value: HIGH

Trust: 0.2

IVD: 0df72e19-8991-452b-aa9e-dfb4039451cc
value: HIGH

Trust: 0.2

VULHUB: VHN-163143
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-10644
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2020-34643
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 0243acd1-a6e8-498a-bb1d-677fa500ffe3
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 0df72e19-8991-452b-aa9e-dfb4039451cc
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-163143
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

IPA score: JVNDB-2020-004797
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: 3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 1.6

nvd@nist.gov: CVE-2020-10644
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

IPA score: JVNDB-2020-004797
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

IPA score: JVNDB-2020-004797
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: 3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2020-10644
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: IVD: 0243acd1-a6e8-498a-bb1d-677fa500ffe3 // IVD: 0df72e19-8991-452b-aa9e-dfb4039451cc // ZDI: ZDI-20-686 // CNVD: CNVD-2020-34643 // VULHUB: VHN-163143 // JVNDB: JVNDB-2020-004797 // JVNDB: JVNDB-2020-004797 // JVNDB: JVNDB-2020-004797 // JVNDB: JVNDB-2020-004797 // CNNVD: CNNVD-202005-1323 // NVD: CVE-2020-10644

PROBLEMTYPE DATA

problemtype:CWE-502

Trust: 1.9

problemtype:CWE-306

Trust: 0.8

sources: VULHUB: VHN-163143 // JVNDB: JVNDB-2020-004797 // NVD: CVE-2020-10644

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202005-1323

TYPE

Code problem

Trust: 1.0

sources: IVD: 0243acd1-a6e8-498a-bb1d-677fa500ffe3 // IVD: 0df72e19-8991-452b-aa9e-dfb4039451cc // CNNVD: CNNVD-202005-1323

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-004797

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-163143

PATCH

title:Ignition Release Notesurl:https://inductiveautomation.com/downloads/releasenotes/8.0.10

Trust: 0.8

title:Inductive Automation has issued an update to correct this vulnerability.url:https://www.us-cert.gov/ics/advisories/icsa-20-147-01

Trust: 0.7

title:Patch for Inductive Automation Ignition code issue vulnerability (CNVD-2020-34643)url:https://www.cnvd.org.cn/patchInfo/show/223069

Trust: 0.6

sources: ZDI: ZDI-20-686 // CNVD: CNVD-2020-34643 // JVNDB: JVNDB-2020-004797

EXTERNAL IDS

db:NVDid:CVE-2020-10644

Trust: 4.2

db:ICS CERTid:ICSA-20-147-01

Trust: 3.1

db:PACKETSTORMid:158226

Trust: 1.7

db:ZDIid:ZDI-20-686

Trust: 1.3

db:CNVDid:CNVD-2020-34643

Trust: 1.1

db:CNNVDid:CNNVD-202005-1323

Trust: 1.1

db:JVNid:JVNVU91608150

Trust: 0.8

db:JVNDBid:JVNDB-2020-004797

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-10276

Trust: 0.7

db:NSFOCUSid:46771

Trust: 0.6

db:AUSCERTid:ESB-2020.1872

Trust: 0.6

db:IVDid:0243ACD1-A6E8-498A-BB1D-677FA500FFE3

Trust: 0.2

db:IVDid:0DF72E19-8991-452B-AA9E-DFB4039451CC

Trust: 0.2

db:VULHUBid:VHN-163143

Trust: 0.1

sources: IVD: 0243acd1-a6e8-498a-bb1d-677fa500ffe3 // IVD: 0df72e19-8991-452b-aa9e-dfb4039451cc // ZDI: ZDI-20-686 // CNVD: CNVD-2020-34643 // VULHUB: VHN-163143 // JVNDB: JVNDB-2020-004797 // CNNVD: CNNVD-202005-1323 // NVD: CVE-2020-10644

REFERENCES

url:https://www.us-cert.gov/ics/advisories/icsa-20-147-01

Trust: 4.4

url:http://packetstormsecurity.com/files/158226/inductive-automation-ignition-remote-code-execution.html

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-14479

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12004

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-10644

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12000

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91608150/

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.1872/

Trust: 0.6

url:https://www.zerodayinitiative.com/advisories/zdi-20-686/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-10644

Trust: 0.6

url:http://www.nsfocus.net/vulndb/46771

Trust: 0.6

sources: ZDI: ZDI-20-686 // CNVD: CNVD-2020-34643 // VULHUB: VHN-163143 // JVNDB: JVNDB-2020-004797 // CNNVD: CNNVD-202005-1323 // NVD: CVE-2020-10644

CREDITS

Team FLASHBACK: Pedro Ribeiro (pedrib@gmail.com|@pedrib1337) and Radek Domanski (@RabbitPro)

Trust: 0.7

sources: ZDI: ZDI-20-686

SOURCES

db:IVDid:0243acd1-a6e8-498a-bb1d-677fa500ffe3
db:IVDid:0df72e19-8991-452b-aa9e-dfb4039451cc
db:ZDIid:ZDI-20-686
db:CNVDid:CNVD-2020-34643
db:VULHUBid:VHN-163143
db:JVNDBid:JVNDB-2020-004797
db:CNNVDid:CNNVD-202005-1323
db:NVDid:CVE-2020-10644

LAST UPDATE DATE

2024-11-23T21:59:12.805000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-20-686date:2021-06-29T00:00:00
db:CNVDid:CNVD-2020-34643date:2020-06-24T00:00:00
db:VULHUBid:VHN-163143date:2020-06-25T00:00:00
db:JVNDBid:JVNDB-2020-004797date:2020-07-02T00:00:00
db:CNNVDid:CNNVD-202005-1323date:2020-06-30T00:00:00
db:NVDid:CVE-2020-10644date:2024-11-21T04:55:45.780

SOURCES RELEASE DATE

db:IVDid:0243acd1-a6e8-498a-bb1d-677fa500ffe3date:2020-05-26T00:00:00
db:IVDid:0df72e19-8991-452b-aa9e-dfb4039451ccdate:2020-05-26T00:00:00
db:ZDIid:ZDI-20-686date:2020-06-01T00:00:00
db:CNVDid:CNVD-2020-34643date:2020-06-24T00:00:00
db:VULHUBid:VHN-163143date:2020-06-09T00:00:00
db:JVNDBid:JVNDB-2020-004797date:2020-05-28T00:00:00
db:CNNVDid:CNNVD-202005-1323date:2020-05-26T00:00:00
db:NVDid:CVE-2020-10644date:2020-06-09T18:15:10.590