Home

Description

The vulnerability affects Ignition SCADA applications where Python scripting is utilized for automation purposes. The vulnerability arises from the absence of proper security controls that restrict which Python libraries can be imported and executed within the scripting environment. The core issue lies in the Ignition service account having system permissions beyond what an Ignition privileged user requires. When an authenticated administrator uploads a malicious project file containing Python scripts with bind shell capabilities, the application executes these scripts with the same privileges as the Ignition Gateway process, which typically runs with SYSTEM-level permissions on Windows. Alternative code execution patterns could lead to similar results.

PUBLISHED Reserved 2025-12-02 | Published 2025-12-18 | Updated 2025-12-18 | Assigner icscert




MEDIUM: 6.4CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

HIGH: 7.3CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-250

Product status

Default status
unaffected

8.1.x
affected

8.3.x
affected

Credits

Momen Eldawakhly of Samurai Digital Security Ltd reported this vulnerability to CISA finder

References

security.inductiveautomation.com/

www.cisa.gov/news-events/ics-advisories/icsa-25-352-01

github.com/...p/csaf_files/OT/white/2025/icsa-25-352-01.json

cve.org (CVE-2025-13911)

nvd.nist.gov (CVE-2025-13911)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.