PT-2015-08: Bypass Anti-Bruteforce Mechanism in Inductive Automation Ignition Vulnerable softwareInductive Automation Ignition Version: 7.7.3 and earlierLink: https://www.inductiveautomation.com/Severity levelSeverity level: Medium Impact: Bypass Anti-Bruteforce Mechanism Access Vector: Remote CVSS v2: Base Score: 4.6 Vector: (AV:N/AC:H/Au:S/C:P/I:P/A:P)CVE: not assignedSoftware descriptionInductive Automation Ignition is a cross-platform HMI, SCADA, and MES solution.Vulnerability descriptionThe specialists of the Positive Research center have detected a Bypass Anti-Bruteforce Mechanism vulnerability in Inductive Automation Ignition.The mechanism of blocking bruteforce attacks could be bypassed with resetting session id parameter in HTTP request. The mechanism blocking bruteforce attack bypass reset session id.How to fixUpdate your sofware up to the latest versionAdvisory status 12.02.2015 - Vendor gets vulnerability details 09.03.2015 - Vendor releases fixed version and details 11.03.2015 - Public disclosureCreditsThe vulnerability was detected by Evgeny Druzhinin, Positive Research Center (Positive Technologies Company)References http://en.securitylab.ru/lab/PT-2015-08 Reports on the vulnerabilities previously discovered by Positive Research:http://www.ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/