CVE-2022-35890
📋 TL;DR
This vulnerability allows attackers to predict previously generated session IDs in Inductive Automation Ignition, enabling session hijacking. Attackers can take over active user sessions in Designer and Vision Client components. Systems running vulnerable versions of Ignition are affected.
💻 Affected Systems
- Inductive Automation Ignition
📦 What is this software?
Ignition by Inductiveautomation
Ignition by Inductiveautomation
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of Ignition systems, unauthorized access to industrial control systems, data theft, and potential manipulation of industrial processes.
Likely Case
Session hijacking leading to unauthorized access to Ignition interfaces, privilege escalation, and data exfiltration from affected systems.
If Mitigated
Limited impact with proper network segmentation, but still potential for unauthorized access within the Ignition environment.
🎯 Exploit Status
The Randy exploit tool is publicly available and demonstrates session ID prediction and hijacking.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.9.20 and 8.1.17
Vendor Advisory: https://support.inductiveautomation.com/hc/en-us/articles/7625759776653
Restart Required: Yes
Instructions:
1. Download and install Ignition version 7.9.20 or 8.1.17 from the Inductive Automation website. 2. Stop all Ignition services. 3. Run the installer. 4. Restart Ignition services. 5. Verify the update completed successfully.
🔧 Temporary Workarounds
Network Segmentation
allIsolate Ignition systems from untrusted networks and implement strict firewall rules.
Session Timeout Reduction
allReduce session timeout values to limit the window for session hijacking.
🧯 If You Can't Patch
- Implement strict network access controls to limit connections to Ignition systems
- Monitor for unusual session activity and implement session termination policies
🔍 How to Verify
Check if Vulnerable:
Check Ignition version in Gateway Web Interface under Status > About, or run 'java -jar ignition.jar --version' from installation directory.
Check Version:
java -jar ignition.jar --version
Verify Fix Applied:
Confirm version is 7.9.20 or higher for Ignition 7, or 8.1.17 or higher for Ignition 8.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts followed by successful login from different IP
- Session ID reuse from different source IPs
- Unusual session creation patterns
Network Indicators:
- Unexpected connections to Ignition ports (typically 8088, 8043)
- Traffic patterns indicating session hijacking attempts
SIEM Query:
source="ignition.log" AND ("session hijack" OR "invalid session" OR "session ID mismatch")