#VU7099 Improper authentication in PI Data Archive


Published: 2017-06-15

Vulnerability identifier: #VU7099

Vulnerability risk: Low

CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-7930

CWE-ID: CWE-287

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
PI Data Archive
Client/Desktop applications / Software for archiving

Vendor: OSIsoft

Description
The vulnerability allows a remote attacker to perform spoofing attack on the target system.

The weakness exists due to protocol flaws in PI Data Archive. A remote attacker can access change records and spoof a PI Server within a collective.

Successful exploitation results in server spoofing.

Mitigation
Update to version 2017.

Vulnerable software versions

PI Data Archive: 2015 - 2016


External links
http://ics-cert.us-cert.gov/advisories/ICSA-17-164-02


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability