OSIsoft PI System (Update A)
OSIsoft PI System contains multiple local privilege escalation and code execution vulnerabilities across core components including PI Data Archive, PI connectors (BACnet, UFL, Siemens PCS 7, CygNet, HART-IP, Ethernet/IP, OPC-UA, IEC 60870-5-104), PI API, PI Asset Framework Client, PI Vision, PI ProcessBook, PI DataLink, PI Manual Logger, PI Data Collection Manager, PI Buffer Subsystem, and applications built on the PI SDK. The vulnerabilities stem from unsafe deserialization, insecure library loading, improper access controls, and unvalidated input handling. An attacker with local access to affected systems could execute arbitrary code and access sensitive process data.
- Local logon access to a PI System server, interface node, or workstation
- Remote desktop or console access if enabled on unattended servers
- User-level or service account privileges (no admin rights required for some vulnerabilities)
- Vulnerable PI System component installed (Data Archive, Connector, SDK application, or PI Vision)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/83ef0165-8073-4b93-994d-be9219f16f5bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.