PT-2015-08: Bypass Anti-Bruteforce Mechanism in Inductive Automation Ignition

Vulnerable software

Inductive Automation Ignition
Version: 7.7.3 and earlier

Link:
https://www.inductiveautomation.com/

Severity level

Severity level: Medium
Impact: Bypass Anti-Bruteforce Mechanism
Access Vector: Remote

CVSS v2:
Base Score: 4.6
Vector: (AV:N/AC:H/Au:S/C:P/I:P/A:P)

CVE: not assigned

Software description

Inductive Automation Ignition is a cross-platform HMI, SCADA, and MES solution.

Vulnerability description

The specialists of the Positive Research center have detected a Bypass Anti-Bruteforce Mechanism vulnerability in Inductive Automation Ignition.

The mechanism of blocking bruteforce attacks could be bypassed with resetting session id parameter in HTTP request. The mechanism blocking bruteforce attack bypass reset session id.

How to fix

Update your sofware up to the latest version

Advisory status

12.02.2015 - Vendor gets vulnerability details
09.03.2015 - Vendor releases fixed version and details
11.03.2015 - Public disclosure

Credits

The vulnerability was detected by Evgeny Druzhinin, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2015-08

Reports on the vulnerabilities previously discovered by Positive Research:

http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/

Threatscape