CVE-2020-14479

ICSA-20-147-01 Inductive Automation Ignition (Update B)

Description

Sensitive information can be obtained through the handling of serialized data. The issue results from the lack of proper authentication required to query the server

Remediation

Workaround:

  • Please note CVE-2020-14479 does not have a fix in place. Induction Automation plans to correct this vulnerability in future product versions. It is recommended to restrict interaction with the service to trusted machines. Only clients and servers with a legitimate procedural relationship should be permitted to communicate with the service. This can be done in various ways, most notably with firewall rules/allow listing. For more information regarding software and patches, please refer to the specified version in Inductive Automation’s release notes.

Category

5.3
CVSS
Severity: Medium
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.14%
Third-Party Advisory cisa.gov
Affected: Inductive Automation Ignition 7 Gateway
Affected: Inductive Automation Ignition 8 Gateway
Published at:
Updated at:

References

Link Tags
https://www.cisa.gov/uscert/ics/advisories/icsa-20-147-01 us government resource third party advisory patch

Frequently Asked Questions

What is the severity of CVE-2020-14479?
CVE-2020-14479 has been scored as a medium severity vulnerability.
How to fix CVE-2020-14479?
As a workaround for remediating CVE-2020-14479: Please note CVE-2020-14479 does not have a fix in place. Induction Automation plans to correct this vulnerability in future product versions. It is recommended to restrict interaction with the service to trusted machines. Only clients and servers with a legitimate procedural relationship should be permitted to communicate with the service. This can be done in various ways, most notably with firewall rules/allow listing. For more information regarding software and patches, please refer to the specified version in Inductive Automation’s release notes.
Is CVE-2020-14479 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2020-14479 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2020-14479?
CVE-2020-14479 affects Inductive Automation Ignition 7 Gateway, Inductive Automation Ignition 8 Gateway.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.