The vulnerability affects Ignition SCADA applications where Python
scripting is utilized for automation purposes. The vulnerability arises
from the absence of proper security controls that restrict which Python
libraries can be imported and executed within the scripting environment.
The core issue lies in the Ignition service account having system
permissions beyond what an Ignition privileged user requires. When an
authenticated administrator uploads a malicious project file containing
Python scripts with bind shell capabilities, the application executes
these scripts with the same privileges as the Ignition Gateway process,
which typically runs with SYSTEM-level permissions on Windows.
Alternative code execution patterns could lead to similar results.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

Inductive Automation encourages users to do the following in order to reduce the risk of this vulnerability: * Create a new dedicated local Windows account that will be used exclusively for the Ignition service (e.g. svc-ign) (this should not be a domain account). * Remove all group memberships from the service account (including Users and Administrators). * Add to security policy to log in as a service. * Add to “Deny log on locally” security policy. * Provide full read/write access only to the Ignition installation directory for the service account created in step 1. * Add read/write permissions to other directories in the local filesystem as needed (e.g: if configured to use optional Enterprise Administration Module to write automated backups to the file system). * Set deny access settings for service account on other directories not needed by the Ignition service. * Specifically the C:\Windows, C:\Users, and directories for any other applications in the Program Files or Program Files(x86) directories. * Use java param to change temp directory to a location within the Ignition install directory so the Users folder can be denied access to the Ignition service account. * Restrict project imports to verified and trusted sources only, ideally using checksums or digital signatures. * Use multiple environments (e.g. Dev, Test, Prod) with a staging workflow so that new data is never introduced directly to Production environments. See Ignition Deployment Best Practices. * When feasible, segment or isolate Ignition gateways from corporate resources and Windows Domains. * The Ignition service account or AD server object should never need Windows Domain or Windows Active Directory privileges. This would only be needed if an Asset Owners IT or OT department uses this for management outside Ignition. * Ignition may be federated with Active Directory environments (e.g. OT domains) by entering “Authentication Profile” credentials within the Ignition gateway itself. This could use secure LDAP, SAML, or OpenID Connect. * When feasible, enforce strong credential management and MFA for all users with Designer permissions (8.1.x and 8.3.x), Config Page permissions (8.1.x), and Config Write permissions (8.3.x). * When feasible, deploy Ignition within hardened or containerized environments. For more information and updates, users should refer to Inductive Automation's Trust Portal https://security.inductiveautomation.com .

History

Thu, 18 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 20:30:00 +0000

Type Values Removed Values Added
Description The vulnerability affects Ignition SCADA applications where Python scripting is utilized for automation purposes. The vulnerability arises from the absence of proper security controls that restrict which Python libraries can be imported and executed within the scripting environment. The core issue lies in the Ignition service account having system permissions beyond what an Ignition privileged user requires. When an authenticated administrator uploads a malicious project file containing Python scripts with bind shell capabilities, the application executes these scripts with the same privileges as the Ignition Gateway process, which typically runs with SYSTEM-level permissions on Windows. Alternative code execution patterns could lead to similar results.
Title Inductive Automation Ignition Execution with Unnecessary Privileges
Weaknesses CWE-250
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-12-18T20:45:07.276Z

Reserved: 2025-12-02T17:14:36.352Z

Link: CVE-2025-13911

cve-icon Vulnrichment

Updated: 2025-12-18T20:44:59.392Z

cve-icon NVD

Status : Received

Published: 2025-12-18T21:15:52.073

Modified: 2025-12-18T21:15:52.073

Link: CVE-2025-13911

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses