CVE-2025-13911 (GCVE-0-2025-13911)

Vulnerability from cvelistv5 – Published: 2025-12-18 20:24 – Updated: 2025-12-18 20:45
VLAI?
Title
Inductive Automation Ignition Execution with Unnecessary Privileges
Summary
The vulnerability affects Ignition SCADA applications where Python scripting is utilized for automation purposes. The vulnerability arises from the absence of proper security controls that restrict which Python libraries can be imported and executed within the scripting environment. The core issue lies in the Ignition service account having system permissions beyond what an Ignition privileged user requires. When an authenticated administrator uploads a malicious project file containing Python scripts with bind shell capabilities, the application executes these scripts with the same privileges as the Ignition Gateway process, which typically runs with SYSTEM-level permissions on Windows. Alternative code execution patterns could lead to similar results.
CWE
Assigner
Impacted products
Vendor Product Version
Inductive Automation Ignition Affected: 8.1.x
Affected: 8.3.x
Create a notification for this product.
Credits
Momen Eldawakhly of Samurai Digital Security Ltd reported this vulnerability to CISA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-13911",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-18T20:44:32.471219Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-18T20:45:07.276Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Ignition",
          "vendor": "Inductive Automation",
          "versions": [
            {
              "status": "affected",
              "version": "8.1.x"
            },
            {
              "status": "affected",
              "version": "8.3.x"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Momen Eldawakhly of Samurai Digital Security Ltd reported this vulnerability to CISA"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The vulnerability affects Ignition SCADA applications where Python \nscripting is utilized for automation purposes. The vulnerability arises \nfrom the absence of proper security controls that restrict which Python \nlibraries can be imported and executed within the scripting environment.\n The core issue lies in the Ignition service account having system \npermissions beyond what an Ignition privileged user requires. When an \nauthenticated administrator uploads a malicious project file containing \nPython scripts with bind shell capabilities, the application executes \nthese scripts with the same privileges as the Ignition Gateway process, \nwhich typically runs with SYSTEM-level permissions on Windows. \nAlternative code execution patterns could lead to similar results.\n\n\u003cbr\u003e"
            }
          ],
          "value": "The vulnerability affects Ignition SCADA applications where Python \nscripting is utilized for automation purposes. The vulnerability arises \nfrom the absence of proper security controls that restrict which Python \nlibraries can be imported and executed within the scripting environment.\n The core issue lies in the Ignition service account having system \npermissions beyond what an Ignition privileged user requires. When an \nauthenticated administrator uploads a malicious project file containing \nPython scripts with bind shell capabilities, the application executes \nthese scripts with the same privileges as the Ignition Gateway process, \nwhich typically runs with SYSTEM-level permissions on Windows. \nAlternative code execution patterns could lead to similar results."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "HIGH",
            "attackRequirements": "NONE",
            "attackVector": "ADJACENT",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-250",
              "description": "CWE-250",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-18T20:24:30.118Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://security.inductiveautomation.com/"
        },
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-352-01"
        },
        {
          "url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-352-01.json"
        }
      ],
      "source": {
        "advisory": "ICSA-25-352-01",
        "discovery": "EXTERNAL"
      },
      "title": "Inductive Automation Ignition Execution with Unnecessary Privileges",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eInductive Automation encourages users to do the following in order to reduce the risk of this vulnerability:\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003eCreate a new dedicated local Windows account that will be used \nexclusively for the Ignition service (e.g. svc-ign) (this should not be a\n domain account).\u003c/li\u003e\n\u003cli\u003eRemove all group memberships from the service account (including Users and Administrators). \u003c/li\u003e\n\u003cli\u003eAdd to security policy to log in as a service.\u003c/li\u003e\n\u003cli\u003eAdd to \u201cDeny log on locally\u201d security policy.\u003c/li\u003e\n\u003cli\u003eProvide full read/write access only to the Ignition installation directory for the service account created in step 1.\u003c/li\u003e\n\u003cli\u003eAdd read/write permissions to other directories in the local \nfilesystem as needed (e.g: if configured to use optional Enterprise \nAdministration Module to write automated backups to the file system). \u003c/li\u003e\n\u003cli\u003eSet deny access settings for service account on other directories not needed by the Ignition service.\u003c/li\u003e\n\u003cli\u003eSpecifically the C:\\Windows, C:\\Users, and directories for any other\n applications in the Program Files or Program Files(x86) directories.\u003c/li\u003e\n\u003cli\u003eUse java param to change temp directory to a location within the \nIgnition install directory so the Users folder can be denied access to \nthe Ignition service account.\u003c/li\u003e\n\u003cli\u003eRestrict project imports to verified and trusted sources only, ideally using checksums or digital signatures.\u003c/li\u003e\n\u003cli\u003eUse multiple environments (e.g. Dev, Test, Prod) with a staging \nworkflow so that new data is never introduced directly to Production \nenvironments. See Ignition Deployment Best Practices. \u003c/li\u003e\n\u003cli\u003eWhen feasible, segment or isolate Ignition gateways from corporate resources and Windows Domains. \u003c/li\u003e\n\u003cli\u003eThe Ignition service account or AD server object should never need \nWindows Domain or Windows Active Directory privileges. This would only \nbe needed if an Asset Owners IT or OT department uses this for \nmanagement outside Ignition. \u003c/li\u003e\n\u003cli\u003eIgnition may be federated with Active Directory environments (e.g. \nOT domains) by entering \u201cAuthentication Profile\u201d credentials within the \nIgnition gateway itself. This could use secure LDAP, SAML, or OpenID \nConnect.  \u003c/li\u003e\n\u003cli\u003eWhen feasible, enforce strong credential management and MFA for all \nusers with Designer permissions (8.1.x and 8.3.x), Config Page \npermissions (8.1.x), and Config Write permissions (8.3.x).\u003c/li\u003e\n\u003cli\u003eWhen feasible, deploy Ignition within hardened or containerized environments.\u003c/li\u003e\n\u003c/ol\u003e\n\u003cp\u003eFor more information and updates, users should refer to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://security.inductiveautomation.com\"\u003eInductive Automation\u0027s Trust Portal\u003c/a\u003e.\u003c/p\u003e\n\n\u003cbr\u003e"
            }
          ],
          "value": "Inductive Automation encourages users to do the following in order to reduce the risk of this vulnerability:\n\n\n\n  *  Create a new dedicated local Windows account that will be used \nexclusively for the Ignition service (e.g. svc-ign) (this should not be a\n domain account).\n\n  *  Remove all group memberships from the service account (including Users and Administrators). \n\n  *  Add to security policy to log in as a service.\n\n  *  Add to \u201cDeny log on locally\u201d security policy.\n\n  *  Provide full read/write access only to the Ignition installation directory for the service account created in step 1.\n\n  *  Add read/write permissions to other directories in the local \nfilesystem as needed (e.g: if configured to use optional Enterprise \nAdministration Module to write automated backups to the file system). \n\n  *  Set deny access settings for service account on other directories not needed by the Ignition service.\n\n  *  Specifically the C:\\Windows, C:\\Users, and directories for any other\n applications in the Program Files or Program Files(x86) directories.\n\n  *  Use java param to change temp directory to a location within the \nIgnition install directory so the Users folder can be denied access to \nthe Ignition service account.\n\n  *  Restrict project imports to verified and trusted sources only, ideally using checksums or digital signatures.\n\n  *  Use multiple environments (e.g. Dev, Test, Prod) with a staging \nworkflow so that new data is never introduced directly to Production \nenvironments. See Ignition Deployment Best Practices. \n\n  *  When feasible, segment or isolate Ignition gateways from corporate resources and Windows Domains. \n\n  *  The Ignition service account or AD server object should never need \nWindows Domain or Windows Active Directory privileges. This would only \nbe needed if an Asset Owners IT or OT department uses this for \nmanagement outside Ignition. \n\n  *  Ignition may be federated with Active Directory environments (e.g. \nOT domains) by entering \u201cAuthentication Profile\u201d credentials within the \nIgnition gateway itself. This could use secure LDAP, SAML, or OpenID \nConnect.  \n\n  *  When feasible, enforce strong credential management and MFA for all \nusers with Designer permissions (8.1.x and 8.3.x), Config Page \npermissions (8.1.x), and Config Write permissions (8.3.x).\n\n  *  When feasible, deploy Ignition within hardened or containerized environments.\n\n\nFor more information and updates, users should refer to  Inductive Automation\u0027s Trust Portal https://security.inductiveautomation.com ."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2025-13911",
    "datePublished": "2025-12-18T20:24:30.118Z",
    "dateReserved": "2025-12-02T17:14:36.352Z",
    "dateUpdated": "2025-12-18T20:45:07.276Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-13911\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2025-12-18T21:15:52.073\",\"lastModified\":\"2025-12-19T18:00:18.330\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The vulnerability affects Ignition SCADA applications where Python \\nscripting is utilized for automation purposes. The vulnerability arises \\nfrom the absence of proper security controls that restrict which Python \\nlibraries can be imported and executed within the scripting environment.\\n The core issue lies in the Ignition service account having system \\npermissions beyond what an Ignition privileged user requires. When an \\nauthenticated administrator uploads a malicious project file containing \\nPython scripts with bind shell capabilities, the application executes \\nthese scripts with the same privileges as the Ignition Gateway process, \\nwhich typically runs with SYSTEM-level permissions on Windows. \\nAlternative code execution patterns could lead to similar results.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.5,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-250\"}]}],\"references\":[{\"url\":\"https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-352-01.json\",\"source\":\"ics-cert@hq.dhs.gov\"},{\"url\":\"https://security.inductiveautomation.com/\",\"source\":\"ics-cert@hq.dhs.gov\"},{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-25-352-01\",\"source\":\"ics-cert@hq.dhs.gov\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-13911\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-12-18T20:44:32.471219Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-12-18T20:44:59.392Z\"}}], \"cna\": {\"title\": \"Inductive Automation Ignition Execution with Unnecessary Privileges\", \"source\": {\"advisory\": \"ICSA-25-352-01\", \"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Momen Eldawakhly of Samurai Digital Security Ltd reported this vulnerability to CISA\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.4, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 7.3, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"ADJACENT\", \"baseSeverity\": \"HIGH\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N\", \"exploitMaturity\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Inductive Automation\", \"product\": \"Ignition\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.1.x\"}, {\"status\": \"affected\", \"version\": \"8.3.x\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://security.inductiveautomation.com/\"}, {\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-25-352-01\"}, {\"url\": \"https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-352-01.json\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Inductive Automation encourages users to do the following in order to reduce the risk of this vulnerability:\\n\\n\\n\\n  *  Create a new dedicated local Windows account that will be used \\nexclusively for the Ignition service (e.g. svc-ign) (this should not be a\\n domain account).\\n\\n  *  Remove all group memberships from the service account (including Users and Administrators). \\n\\n  *  Add to security policy to log in as a service.\\n\\n  *  Add to \\u201cDeny log on locally\\u201d security policy.\\n\\n  *  Provide full read/write access only to the Ignition installation directory for the service account created in step 1.\\n\\n  *  Add read/write permissions to other directories in the local \\nfilesystem as needed (e.g: if configured to use optional Enterprise \\nAdministration Module to write automated backups to the file system). \\n\\n  *  Set deny access settings for service account on other directories not needed by the Ignition service.\\n\\n  *  Specifically the C:\\\\Windows, C:\\\\Users, and directories for any other\\n applications in the Program Files or Program Files(x86) directories.\\n\\n  *  Use java param to change temp directory to a location within the \\nIgnition install directory so the Users folder can be denied access to \\nthe Ignition service account.\\n\\n  *  Restrict project imports to verified and trusted sources only, ideally using checksums or digital signatures.\\n\\n  *  Use multiple environments (e.g. Dev, Test, Prod) with a staging \\nworkflow so that new data is never introduced directly to Production \\nenvironments. See Ignition Deployment Best Practices. \\n\\n  *  When feasible, segment or isolate Ignition gateways from corporate resources and Windows Domains. \\n\\n  *  The Ignition service account or AD server object should never need \\nWindows Domain or Windows Active Directory privileges. This would only \\nbe needed if an Asset Owners IT or OT department uses this for \\nmanagement outside Ignition. \\n\\n  *  Ignition may be federated with Active Directory environments (e.g. \\nOT domains) by entering \\u201cAuthentication Profile\\u201d credentials within the \\nIgnition gateway itself. This could use secure LDAP, SAML, or OpenID \\nConnect.  \\n\\n  *  When feasible, enforce strong credential management and MFA for all \\nusers with Designer permissions (8.1.x and 8.3.x), Config Page \\npermissions (8.1.x), and Config Write permissions (8.3.x).\\n\\n  *  When feasible, deploy Ignition within hardened or containerized environments.\\n\\n\\nFor more information and updates, users should refer to  Inductive Automation\u0027s Trust Portal https://security.inductiveautomation.com .\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eInductive Automation encourages users to do the following in order to reduce the risk of this vulnerability:\u003c/p\u003e\\n\u003col\u003e\\n\u003cli\u003eCreate a new dedicated local Windows account that will be used \\nexclusively for the Ignition service (e.g. svc-ign) (this should not be a\\n domain account).\u003c/li\u003e\\n\u003cli\u003eRemove all group memberships from the service account (including Users and Administrators). \u003c/li\u003e\\n\u003cli\u003eAdd to security policy to log in as a service.\u003c/li\u003e\\n\u003cli\u003eAdd to \\u201cDeny log on locally\\u201d security policy.\u003c/li\u003e\\n\u003cli\u003eProvide full read/write access only to the Ignition installation directory for the service account created in step 1.\u003c/li\u003e\\n\u003cli\u003eAdd read/write permissions to other directories in the local \\nfilesystem as needed (e.g: if configured to use optional Enterprise \\nAdministration Module to write automated backups to the file system). \u003c/li\u003e\\n\u003cli\u003eSet deny access settings for service account on other directories not needed by the Ignition service.\u003c/li\u003e\\n\u003cli\u003eSpecifically the C:\\\\Windows, C:\\\\Users, and directories for any other\\n applications in the Program Files or Program Files(x86) directories.\u003c/li\u003e\\n\u003cli\u003eUse java param to change temp directory to a location within the \\nIgnition install directory so the Users folder can be denied access to \\nthe Ignition service account.\u003c/li\u003e\\n\u003cli\u003eRestrict project imports to verified and trusted sources only, ideally using checksums or digital signatures.\u003c/li\u003e\\n\u003cli\u003eUse multiple environments (e.g. Dev, Test, Prod) with a staging \\nworkflow so that new data is never introduced directly to Production \\nenvironments. See Ignition Deployment Best Practices. \u003c/li\u003e\\n\u003cli\u003eWhen feasible, segment or isolate Ignition gateways from corporate resources and Windows Domains. \u003c/li\u003e\\n\u003cli\u003eThe Ignition service account or AD server object should never need \\nWindows Domain or Windows Active Directory privileges. This would only \\nbe needed if an Asset Owners IT or OT department uses this for \\nmanagement outside Ignition. \u003c/li\u003e\\n\u003cli\u003eIgnition may be federated with Active Directory environments (e.g. \\nOT domains) by entering \\u201cAuthentication Profile\\u201d credentials within the \\nIgnition gateway itself. This could use secure LDAP, SAML, or OpenID \\nConnect.  \u003c/li\u003e\\n\u003cli\u003eWhen feasible, enforce strong credential management and MFA for all \\nusers with Designer permissions (8.1.x and 8.3.x), Config Page \\npermissions (8.1.x), and Config Write permissions (8.3.x).\u003c/li\u003e\\n\u003cli\u003eWhen feasible, deploy Ignition within hardened or containerized environments.\u003c/li\u003e\\n\u003c/ol\u003e\\n\u003cp\u003eFor more information and updates, users should refer to \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://security.inductiveautomation.com\\\"\u003eInductive Automation\u0027s Trust Portal\u003c/a\u003e.\u003c/p\u003e\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.5.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"The vulnerability affects Ignition SCADA applications where Python \\nscripting is utilized for automation purposes. The vulnerability arises \\nfrom the absence of proper security controls that restrict which Python \\nlibraries can be imported and executed within the scripting environment.\\n The core issue lies in the Ignition service account having system \\npermissions beyond what an Ignition privileged user requires. When an \\nauthenticated administrator uploads a malicious project file containing \\nPython scripts with bind shell capabilities, the application executes \\nthese scripts with the same privileges as the Ignition Gateway process, \\nwhich typically runs with SYSTEM-level permissions on Windows. \\nAlternative code execution patterns could lead to similar results.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"The vulnerability affects Ignition SCADA applications where Python \\nscripting is utilized for automation purposes. The vulnerability arises \\nfrom the absence of proper security controls that restrict which Python \\nlibraries can be imported and executed within the scripting environment.\\n The core issue lies in the Ignition service account having system \\npermissions beyond what an Ignition privileged user requires. When an \\nauthenticated administrator uploads a malicious project file containing \\nPython scripts with bind shell capabilities, the application executes \\nthese scripts with the same privileges as the Ignition Gateway process, \\nwhich typically runs with SYSTEM-level permissions on Windows. \\nAlternative code execution patterns could lead to similar results.\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-250\", \"description\": \"CWE-250\"}]}], \"providerMetadata\": {\"orgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"shortName\": \"icscert\", \"dateUpdated\": \"2025-12-18T20:24:30.118Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-13911\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-18T20:45:07.276Z\", \"dateReserved\": \"2025-12-02T17:14:36.352Z\", \"assignerOrgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"datePublished\": \"2025-12-18T20:24:30.118Z\", \"assignerShortName\": \"icscert\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…