Induction Automation Ignition Multiple Vulnerabilities

Medium Nessus Plugin ID 83952


The remote host is affected by multiple vulnerabilities.


The version of Induction Automation Ignition listening on the remote host is affected by multiple vulnerabilities :

- A cross-site scripting vulnerability exists in Java Web Start when adding any symbols to web requests for starting Java applets. A remote attacker can exploit this to inject malicious input and include JNLP files.

- An information disclosure vulnerability exists due to error messages generated by unhandled exceptions.

- OPC server credentials may be insecurely stored in plain text. (CVE-2015-0992)

- Sessions are not properly terminated by the web interface after logout, allowing a remote attacker to reuse the session to gain unauthorized access.

- Resetting the session ID parameter using an HTTP request allows an attacker to bypass prevention mechanisms for brute force login attacks. (CVE-2015-0994)

- A weak hashing algorithm (MD5) is used for storing password information in the authentication database, thus allowing easier brute-force attacks to gain access. (CVE-2015-0995)


Upgrade to Ignition 7.5.14 / 7.7.4.

See Also

Plugin Details

Severity: Medium

ID: 83952

File Name: scada_inductive_automation_ignition_ICSA-15-090-01.nbin

Version: $Revision: 1.26 $

Type: remote

Family: SCADA

Published: 2015/06/02

Modified: 2018/01/29

Dependencies: 83951

Risk Information

Risk Factor: Medium


Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Information

CPE: cpe:/a:inductiveautomation:ignition

Required KB Items: installed_sw/Induction Automation Ignition

Patch Publication Date: 2015/03/31

Vulnerability Publication Date: 2008/12/30

Reference Information

CVE: CVE-2015-0976, CVE-2015-0991, CVE-2015-0992, CVE-2015-0993, CVE-2015-0994, CVE-2015-0995

BID: 73468, 73469, 73471, 73473, 73474, 73475

OSVDB: 45127, 119453, 119454, 119469, 119470, 119471, 120108

ICSA: 15-090-01

CERT: 836068

EDB-ID: 24807