CVE-2022-35871
📋 TL;DR
This vulnerability allows unauthenticated remote attackers to execute arbitrary Python code with SYSTEM privileges on Inductive Automation Ignition installations. The flaw exists in the authenticateAdSso method which lacks proper authentication before executing code. All systems running affected versions are vulnerable.
💻 Affected Systems
- Inductive Automation Ignition
📦 What is this software?
Ignition by Inductiveautomation
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with SYSTEM privileges, allowing attackers to install malware, steal data, pivot to other systems, or disrupt industrial operations.
Likely Case
Remote code execution leading to data theft, ransomware deployment, or unauthorized access to industrial control systems.
If Mitigated
Limited impact if systems are isolated, monitored, and have additional security controls, though risk remains significant.
🎯 Exploit Status
Discovered during Pwn2Own 2022, suggesting exploit development exists. No authentication required lowers barrier to exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 8.1.16 or later
Vendor Advisory: https://support.inductiveautomation.com/hc/en-us/articles/7625759776653-Regarding-Pwn2Own-2022-Vulnerabilities
Restart Required: Yes
Instructions:
1. Download latest Ignition version from vendor portal. 2. Backup current installation. 3. Run installer to upgrade. 4. Restart Ignition services. 5. Verify version is 8.1.16 or higher.
🔧 Temporary Workarounds
Network Segmentation
allIsolate Ignition systems from untrusted networks and internet access
Firewall Rules
allRestrict access to Ignition ports (typically 8088, 8043) to trusted IPs only
🧯 If You Can't Patch
- Implement strict network segmentation and firewall rules to limit access
- Deploy intrusion detection systems and monitor for suspicious Python execution
🔍 How to Verify
Check if Vulnerable:
Check Ignition version in Gateway Web Interface or via gateway status page
Check Version:
Check Gateway Web Interface at http://[ignition-server]:8088/main/system/gateway or review installation directory version files
Verify Fix Applied:
Confirm version is 8.1.16 or higher and test authentication requirements for Python execution
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated requests to authenticateAdSso method
- Unexpected Python code execution
- SYSTEM privilege escalation
Network Indicators:
- Unusual traffic to Ignition ports from untrusted sources
- Python execution requests without authentication
SIEM Query:
source="ignition" AND (method="authenticateAdSso" OR python_execution) AND auth_status="unauthenticated"
🔗 References
- https://support.inductiveautomation.com/hc/en-us/articles/7625759776653-Regarding-Pwn2Own-2022-Vulnerabilities
- https://www.zerodayinitiative.com/advisories/ZDI-22-1018/
- https://support.inductiveautomation.com/hc/en-us/articles/7625759776653-Regarding-Pwn2Own-2022-Vulnerabilities
- https://www.zerodayinitiative.com/advisories/ZDI-22-1018/