Inductive Automation Ignition
Inductive Automation Ignition versions 8.0 (greater than 8.0.4) and 8.1 (less than or equal to 8.1 or greater than or equal to 8.1.10) contain a path traversal/arbitrary file upload vulnerability. An authenticated attacker with network access can upload a malicious zip file to the Ignition server, which is processed without proper validation, allowing code execution on the server. This affects the Ignition HMI/supervisory control platform used in industrial facilities for process monitoring, control, and data logging.
- Valid Ignition user credentials (engineering or administrative access)
- Network access to Ignition web interface (port 8088 or 80/443 if configured)
- Permission to upload files via the Ignition UI
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a02a645e-538f-44c5-a5f7-aeb7a6fe506cGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.