Description
Sensitive information can be obtained through the handling of serialized data. The issue results from the lack of proper authentication required to query the server
Published: 2022-04-01
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Please note CVE-2020-14479 does not have a fix in place. Induction Automation plans to correct this vulnerability in future product versions. It is recommended to restrict interaction with the service to trusted machines. Only clients and servers with a legitimate procedural relationship should be permitted to communicate with the service. This can be done in various ways, most notably with firewall rules/allow listing. For more information regarding software and patches, please refer to the specified version in Inductive Automation’s release notes.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-6615 Sensitive information can be obtained through the handling of serialized data. The issue results from the lack of proper authentication required to query the server
History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Inductiveautomation Ignition
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:32:19.854Z

Reserved: 2020-06-19T00:00:00.000Z

Link: CVE-2020-14479

cve-icon Vulnrichment

Updated: 2024-08-04T12:46:34.702Z

cve-icon NVD

Status : Modified

Published: 2022-04-01T23:15:08.597

Modified: 2024-11-21T05:03:21.647

Link: CVE-2020-14479

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses