Inductive Automation Ignition Software
A vulnerability in Inductive Automation Ignition versions prior to 8.3.0 allows an authenticated, privileged application user to execute malicious code with the permissions of the OS service account running the Ignition process. This occurs through improper handling of project imports or configuration changes (CWE-502 deserialization). The vulnerability is fixed in version 8.3.0; earlier versions require either upgrade or implementation of hardening controls to restrict the service account permissions and limit project import sources.
- Valid Ignition Designer or Config Page (8.1.x) / Config Write (8.3.x) credentials
- Ignition version 8.1.x or earlier
- Service account running Ignition with excessive OS-level permissions
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b555ef30-5d07-4166-a72b-578a60384f0fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.