#VU20454 Inclusion of Sensitive Information in Log Files in OSIsoft PI Web API


Published: 2019-08-29 | Updated: 2019-08-29

Vulnerability identifier: #VU20454

Vulnerability risk: Low

CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-13515

CWE-ID: CWE-532

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
OSIsoft PI Web API
Server applications / Database software

Vendor: OSIsoft

Description

The vulnerability allows a remote attacker to access sensitive information on a targeted system.

The vulnerability exists due to the information written to log files can be of a sensitive nature or expose sensitive user information. A remote authenticated attacker can disclose sensitive information.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

OSIsoft PI Web API: 2018


External links
http://www.us-cert.gov/ics/advisories/icsa-19-225-02


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability