Impact
A privileged Ignition user can import an external file containing specially crafted payload, resulting in execution of embedded malicious code. This deserialization flaw allows an attacker with import privileges to run arbitrary code on the Ignition gateway. The weakness is identified as CWE‑502 (Deserialization of Untrusted Data).
Affected Systems
Inductive Automation Ignition Software, specifically versions 8.1.x. The vulnerability is fixed by upgrading to version 8.3.0 or later. Vendors have issued a solution recommending this upgrade.
Risk and Exploitability
The CVSS score is 5.4, indicating a medium severity vulnerability. The EPSS score is below 1%, suggesting the likelihood of exploitation is currently low, and it is not listed in the CISA KEV catalog. The attack vector is inferred as a local privilege escalation scenario, where an attacker must have import rights within the Ignition gateway to exploit the flaw. Because the exploit requires privileged user access, the risk to systems without such access is reduced, but any environment with the ability to import untrusted projects remains at risk.
OpenCVE Enrichment