scripting is utilized for automation purposes. The vulnerability arises
from the absence of proper security controls that restrict which Python
libraries can be imported and executed within the scripting environment.
The core issue lies in the Ignition service account having system
permissions beyond what an Ignition privileged user requires. When an
authenticated administrator uploads a malicious project file containing
Python scripts with bind shell capabilities, the application executes
these scripts with the same privileges as the Ignition Gateway process,
which typically runs with SYSTEM-level permissions on Windows.
Alternative code execution patterns could lead to similar results.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Inductive Automation encourages users to do the following in order to reduce the risk of this vulnerability: * Create a new dedicated local Windows account that will be used exclusively for the Ignition service (e.g. svc-ign) (this should not be a domain account). * Remove all group memberships from the service account (including Users and Administrators). * Add to security policy to log in as a service. * Add to “Deny log on locally” security policy. * Provide full read/write access only to the Ignition installation directory for the service account created in step 1. * Add read/write permissions to other directories in the local filesystem as needed (e.g: if configured to use optional Enterprise Administration Module to write automated backups to the file system). * Set deny access settings for service account on other directories not needed by the Ignition service. * Specifically the C:\Windows, C:\Users, and directories for any other applications in the Program Files or Program Files(x86) directories. * Use java param to change temp directory to a location within the Ignition install directory so the Users folder can be denied access to the Ignition service account. * Restrict project imports to verified and trusted sources only, ideally using checksums or digital signatures. * Use multiple environments (e.g. Dev, Test, Prod) with a staging workflow so that new data is never introduced directly to Production environments. See Ignition Deployment Best Practices. * When feasible, segment or isolate Ignition gateways from corporate resources and Windows Domains. * The Ignition service account or AD server object should never need Windows Domain or Windows Active Directory privileges. This would only be needed if an Asset Owners IT or OT department uses this for management outside Ignition. * Ignition may be federated with Active Directory environments (e.g. OT domains) by entering “Authentication Profile” credentials within the Ignition gateway itself. This could use secure LDAP, SAML, or OpenID Connect. * When feasible, enforce strong credential management and MFA for all users with Designer permissions (8.1.x and 8.3.x), Config Page permissions (8.1.x), and Config Write permissions (8.3.x). * When feasible, deploy Ignition within hardened or containerized environments. For more information and updates, users should refer to Inductive Automation's Trust Portal https://security.inductiveautomation.com .
Thu, 18 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Dec 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The vulnerability affects Ignition SCADA applications where Python scripting is utilized for automation purposes. The vulnerability arises from the absence of proper security controls that restrict which Python libraries can be imported and executed within the scripting environment. The core issue lies in the Ignition service account having system permissions beyond what an Ignition privileged user requires. When an authenticated administrator uploads a malicious project file containing Python scripts with bind shell capabilities, the application executes these scripts with the same privileges as the Ignition Gateway process, which typically runs with SYSTEM-level permissions on Windows. Alternative code execution patterns could lead to similar results. | |
| Title | Inductive Automation Ignition Execution with Unnecessary Privileges | |
| Weaknesses | CWE-250 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-12-18T20:45:07.276Z
Reserved: 2025-12-02T17:14:36.352Z
Link: CVE-2025-13911
Updated: 2025-12-18T20:44:59.392Z
Status : Received
Published: 2025-12-18T21:15:52.073
Modified: 2025-12-18T21:15:52.073
Link: CVE-2025-13911
No data.
OpenCVE Enrichment
No data.