OSIsoft PI Web API 2017
OSIsoft PI Web API versions before 2017 (1.9.0) are vulnerable to Cross-Site Request Forgery (CSRF) attacks. An attacker can trick a logged-in PI Web API user into performing unintended actions on the historian database, including creating, modifying, or deleting data points and configuration elements. The vulnerability requires no special privileges and can be exploited with low skill by crafting a malicious webpage.
- User must be logged into PI Web API in the same browser session
- User must visit an attacker-controlled or compromised webpage while logged in
- No authentication or network-level access to PI Web API needed beyond being reachable from the user's workstation
OSIsoft recommends that users upgrade to the PI Web API version 2017 (1.9.0) and enable CSRF defense. To enable this option, set the configuration attribute ‘EnableCSRFDefense' to ‘True' in the PI Web API System Configuration element. This element is located at the path "..\OSIsoft\PI Web API\PIWebAPIMachineName\System Configuration" in PI AF Server Configuration database. A new installation of PI Web API 2017 (1.9.0) enables CSRF protection by default.
/api/v1/advisories/0b4b915c-6da6-4163-93e6-ea7fc877e4d0Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.