CVE-2020-25163

7.7 HIGH

📋 TL;DR

This vulnerability allows remote attackers with write access to PI ProcessBook files to inject malicious code that executes when imported into OSIsoft PI Vision. Attackers can potentially access, modify, or delete data based on the victim's user permissions. This affects organizations using PI Vision 2020 versions prior to 3.5.0.

💻 Affected Systems

Products:
  • OSIsoft PI Vision
Versions: 2020 versions prior to 3.5.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have write access to PI ProcessBook files and victim to import/view infected displays in PI Vision.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of PI System data including unauthorized disclosure, modification, or deletion of critical industrial control system data, potentially leading to operational disruption or safety incidents.

🟠

Likely Case

Unauthorized access to sensitive process data, modification of displays to mislead operators, or exfiltration of proprietary industrial information.

🟢

If Mitigated

Limited impact due to network segmentation, strict access controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires write access to ProcessBook files and social engineering to get victims to import/view infected displays.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PI Vision 3.5.0

Vendor Advisory: https://www.cisa.gov/uscert/ics/advisories/icsa-20-315-02

Restart Required: Yes

Instructions:

1. Download PI Vision 3.5.0 from OSIsoft support portal. 2. Backup current configuration. 3. Install update following vendor documentation. 4. Restart PI Vision services. 5. Verify functionality.

🔧 Temporary Workarounds

Restrict ProcessBook file access

all

Limit write access to PI ProcessBook files to trusted administrators only.

Windows: icacls *.pbk /deny "Users":(W)
Linux: chmod 644 *.pbk

Disable automatic import features

windows

Configure PI Vision to require manual approval for imported displays.

🧯 If You Can't Patch

  • Implement strict access controls on PI ProcessBook files allowing write access only to essential personnel.
  • Deploy network segmentation to isolate PI Vision systems from untrusted networks and users.

🔍 How to Verify

Check if Vulnerable:

Check PI Vision version in administration console or via registry: HKEY_LOCAL_MACHINE\SOFTWARE\OSIsoft\PI Vision\Version

Check Version:

reg query "HKLM\SOFTWARE\OSIsoft\PI Vision" /v Version

Verify Fix Applied:

Confirm version is 3.5.0 or later and test import functionality with known safe ProcessBook files.

📡 Detection & Monitoring

Log Indicators:

  • Unusual ProcessBook file modifications
  • Failed import attempts in PI Vision logs
  • Unexpected display rendering errors

Network Indicators:

  • Unusual outbound connections from PI Vision servers
  • Anomalous data transfer patterns

SIEM Query:

source="PI_Vision" AND (event="import_failed" OR event="display_error")

🔗 References

📤 Share & Export