Inductive Automation Ignition ParameterVersionJavaSerializationCodec Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ParameterVersionJavaSerializationCodec class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20290.
History

Thu, 13 Mar 2025 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Inductiveautomation
Inductiveautomation ignition
CPEs cpe:2.3:a:inductiveautomation:ignition:*:*:*:*:*:*:*:*
Vendors & Products Inductiveautomation
Inductiveautomation ignition
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published: 2024-05-03T02:10:41.406Z

Updated: 2024-08-02T18:10:20.695Z

Reserved: 2023-08-02T21:37:23.124Z

Link: CVE-2023-39475

cve-icon Vulnrichment

Updated: 2024-08-02T18:10:20.695Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-03T03:15:13.590

Modified: 2025-03-13T21:48:02.067

Link: CVE-2023-39475

cve-icon Redhat

No data.