ID

VAR-202207-1100


CVE

CVE-2022-35873


TITLE

Inductive Automation Ignition Code Injection Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2024-48766 // CNNVD: CNNVD-202207-1490

DESCRIPTION

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition 8.1.15 (b2022030114). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of ZIP files. Crafted data in a ZIP file can cause the application to execute arbitrary Python scripts. The user interface fails to provide sufficient indication of the hazard. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-16949. Inductive Automation of Ignition Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Inductive Automation Ignition‌ is a comprehensive platform for industrial automation that provides scalable solutions for monitoring, control, data collection and analysis

Trust: 2.88

sources: NVD: CVE-2022-35873 // JVNDB: JVNDB-2022-013797 // ZDI: ZDI-22-1020 // CNVD: CNVD-2024-48766 // VULMON: CVE-2022-35873

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-48766

AFFECTED PRODUCTS

vendor:inductive automationmodel:ignitionscope: - version: -

Trust: 1.5

vendor:inductiveautomationmodel:ignitionscope:eqversion:8.1.15

Trust: 1.0

vendor:inductive automationmodel:ignitionscope:eqversion: -

Trust: 0.8

vendor:inductive automationmodel:ignitionscope:eqversion:8.1.15

Trust: 0.8

vendor:inductivemodel:automation inductive automation ignitionscope:gteversion:7.9.0,<=8.1.16

Trust: 0.6

sources: ZDI: ZDI-22-1020 // CNVD: CNVD-2024-48766 // JVNDB: JVNDB-2022-013797 // NVD: CVE-2022-35873

CVSS

SEVERITY

CVSSV2

CVSSV3

zdi-disclosures@trendmicro.com: CVE-2022-35873
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2022-35873
value: HIGH

Trust: 1.0

NVD: CVE-2022-35873
value: HIGH

Trust: 0.8

ZDI: CVE-2022-35873
value: HIGH

Trust: 0.7

CNVD: CNVD-2024-48766
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202207-1490
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-48766
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

zdi-disclosures@trendmicro.com: CVE-2022-35873
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2022-35873
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ZDI: CVE-2022-35873
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-22-1020 // CNVD: CNVD-2024-48766 // JVNDB: JVNDB-2022-013797 // CNNVD: CNNVD-202207-1490 // NVD: CVE-2022-35873 // NVD: CVE-2022-35873

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-356

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-013797 // NVD: CVE-2022-35873

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202207-1490

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-202207-1490

PATCH

title:Inductive Automation has issued an update to correct this vulnerability.url:https://support.inductiveautomation.com/hc/en-us/articles/7625759776653-Regarding-Pwn2Own-2022-Vulnerabilities

Trust: 0.7

title:Patch for Inductive Automation Ignition Code Injection Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/644301

Trust: 0.6

title:Inductive Automation Ignition Fixes for code injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=201371

Trust: 0.6

sources: ZDI: ZDI-22-1020 // CNVD: CNVD-2024-48766 // CNNVD: CNNVD-202207-1490

EXTERNAL IDS

db:NVDid:CVE-2022-35873

Trust: 4.6

db:ZDIid:ZDI-22-1020

Trust: 3.2

db:CS-HELPid:SB2022071816

Trust: 1.2

db:JVNDBid:JVNDB-2022-013797

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-16949

Trust: 0.7

db:CNVDid:CNVD-2024-48766

Trust: 0.6

db:CNNVDid:CNNVD-202207-1490

Trust: 0.6

db:VULMONid:CVE-2022-35873

Trust: 0.1

sources: ZDI: ZDI-22-1020 // CNVD: CNVD-2024-48766 // VULMON: CVE-2022-35873 // JVNDB: JVNDB-2022-013797 // CNNVD: CNNVD-202207-1490 // NVD: CVE-2022-35873

REFERENCES

url:https://support.inductiveautomation.com/hc/en-us/articles/7625759776653-regarding-pwn2own-2022-vulnerabilities

Trust: 3.2

url:https://www.zerodayinitiative.com/advisories/zdi-22-1020/

Trust: 2.5

url:https://www.cybersecurity-help.cz/vdb/sb2022071816

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-35873

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-35873/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: ZDI: ZDI-22-1020 // CNVD: CNVD-2024-48766 // VULMON: CVE-2022-35873 // JVNDB: JVNDB-2022-013797 // CNNVD: CNNVD-202207-1490 // NVD: CVE-2022-35873

CREDITS

20urdjk

Trust: 0.7

sources: ZDI: ZDI-22-1020

SOURCES

db:ZDIid:ZDI-22-1020
db:CNVDid:CNVD-2024-48766
db:VULMONid:CVE-2022-35873
db:JVNDBid:JVNDB-2022-013797
db:CNNVDid:CNNVD-202207-1490
db:NVDid:CVE-2022-35873

LAST UPDATE DATE

2024-12-21T22:55:55.528000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-22-1020date:2022-07-15T00:00:00
db:CNVDid:CNVD-2024-48766date:2024-12-20T00:00:00
db:VULMONid:CVE-2022-35873date:2022-07-26T00:00:00
db:JVNDBid:JVNDB-2022-013797date:2023-09-12T08:18:00
db:CNNVDid:CNNVD-202207-1490date:2022-08-04T00:00:00
db:NVDid:CVE-2022-35873date:2022-08-03T16:49:28.150

SOURCES RELEASE DATE

db:ZDIid:ZDI-22-1020date:2022-07-15T00:00:00
db:CNVDid:CNVD-2024-48766date:2022-12-26T00:00:00
db:VULMONid:CVE-2022-35873date:2022-07-25T00:00:00
db:JVNDBid:JVNDB-2022-013797date:2023-09-12T00:00:00
db:CNNVDid:CNNVD-202207-1490date:2022-07-18T00:00:00
db:NVDid:CVE-2022-35873date:2022-07-25T19:15:47.380