#VU63493 Improper access control in Ignition


Published: 2022-05-20

Vulnerability identifier: #VU63493

Vulnerability risk: Low

CVSSv3.1: 5.3 [CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1706

CWE-ID: CWE-284

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Ignition
Server applications / SCADA systems

Vendor: CoreOS

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in ignition configs. A remote user on the local network can bypass implemented security restrictions and obtain sensitive information.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Ignition: 2.0.0 - 2.13.0


External links
http://bugzilla.redhat.com/show_bug.cgi?id=2082274
http://github.com/coreos/ignition/issues/1300
http://github.com/coreos/ignition/commit/4b70b44b430ecf8377a276e89b5acd3a6957d4ea
http://github.com/coreos/ignition/pull/1350
http://github.com/coreos/ignition/issues/1315


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability