Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13913: CWE-502 in Inductive Automation Ignition Software

0
Medium
VulnerabilityCVE-2025-13913cvecve-2025-13913cwe-502
Published: Thu Mar 12 2026 (03/12/2026, 18:17:22 UTC)
Source: CVE Database V5
Vendor/Project: Inductive Automation
Product: Ignition Software

Description

Inductive Automation Ignition Software is vulnerable to an unauthenticated API endpoint exposure that may allow an attacker to remotely change the "forgot password" recovery email address.

AI-Powered Analysis

AILast updated: 03/12/2026, 18:47:59 UTC

Technical Analysis

CVE-2025-13913 is a vulnerability identified in Inductive Automation's Ignition Software, a platform widely used for industrial automation and SCADA systems. The flaw arises from an unauthenticated API endpoint that permits remote attackers to alter the email address associated with the 'forgot password' recovery mechanism. This vulnerability is categorized under CWE-502, which relates to unsafe deserialization, suggesting that the API endpoint improperly handles serialized data, allowing malicious input to manipulate internal logic. The vulnerability does not require authentication but does require high privileges and user interaction, indicating that exploitation might involve tricking a privileged user or leveraging complex attack chains. The CVSS 4.0 vector indicates an attack vector of adjacent network (AV:A), high attack complexity (AC:H), no attack type (AT:N), high privileges required (PR:H), user interaction required (UI:A), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). The scope is limited (SC:L), and the impact is local (SI:L, SA:L). Although no public exploits have been reported, the ability to change the recovery email remotely could allow attackers to reset passwords and gain unauthorized access to critical control systems. Given Ignition Software's role in industrial environments, this vulnerability poses a significant risk to operational technology (OT) environments if exploited.

Potential Impact

The primary impact of CVE-2025-13913 is unauthorized account takeover through manipulation of the password recovery process. Attackers could change the recovery email address, enabling them to reset passwords and gain control over user accounts with potentially high privileges. In industrial automation contexts, this could lead to unauthorized access to control systems, disruption of industrial processes, data exfiltration, or sabotage. The vulnerability affects confidentiality, integrity, and availability of the affected systems. Although exploitation complexity is high and requires user interaction and privileges, successful exploitation could compromise critical infrastructure, leading to operational downtime, safety hazards, and financial losses. Organizations relying on Ignition Software for SCADA and industrial control systems are particularly at risk, as attackers gaining access could manipulate physical processes or disrupt services.

Mitigation Recommendations

1. Monitor network traffic for unusual API calls targeting the password recovery endpoints, especially from adjacent network segments. 2. Implement strict network segmentation to isolate Ignition Software servers from less trusted networks and limit access to the API endpoints. 3. Enforce multi-factor authentication (MFA) for all privileged users to reduce the risk of account compromise. 4. Regularly audit and review user accounts and recovery email addresses for unauthorized changes. 5. Apply the vendor's patches or updates promptly once released to address this vulnerability. 6. Employ Web Application Firewalls (WAFs) or API gateways with rules designed to detect and block anomalous deserialization attempts or unauthorized API requests. 7. Educate privileged users about phishing and social engineering risks that could facilitate exploitation requiring user interaction. 8. Maintain comprehensive logging and alerting on password recovery and account modification events to enable rapid incident response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-12-02T17:43:55.964Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b30a4d2f860ef943dbc460

Added to database: 3/12/2026, 6:47:41 PM

Last enriched: 3/12/2026, 6:47:59 PM

Last updated: 3/14/2026, 3:07:07 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses