SCADA Vulnerabilities & Exposures (SVE)

CRITIFENCE® SCADA Vulnerabilities and Exposures Database (SVE)

[SVE-843069153] OSIsoft PI Coresight and PI Web API

Date Type Platform Author EDB-ID CVE-ID OSVDB-ID Download App SIS Signature
2017-01-10OtherOSIsoftVint Maggs from Savannah River Nuclear Solutions reported this issue to OSIsoft. N/ACVE-2017-5153 N/AN/AN/A

Source

						
							
								
#
# OSIsoft PI Coresight and PI Web API
#


### VULNERABLE VENDOR
OSIsoft


### VULNERABLE PRODUCT
PI Coresight, PI Web API



### RESEARCHER
Vint Maggs from Savannah River Nuclear Solutions reported this issue to OSIsoft.



### AFFECTED PRODUCTS

OSIsoft reports that the vulnerability affects the following versions:

PI Coresight 2016 R2 and earlier versions, and
PI Web API 2016 R2 when deployed using the PI AF Services 2016 R2 integrated install kit.



### IMPACT

Anyone with access to the server file system can obtain the service account passwords for the affected services. This is accomplished by examining the installation log file when a nondefault service account and password are specified during installation or upgrade. This potentially leads to unauthorized shutdown of the affected PI services as well as potential reuse of domain credentials.



### VULNERABILITY OVERVIEW

INFORMATION EXPOSURE THROUGH SERVER LOG FILES CWE-533
An information exposure through server log files vulnerability has been identified, which may allow service account passwords to become exposed for the affected services, potentially leading to unauthorized shutdown of the affected PI services as well as potential reuse of domain credentials.
CVE-2017-5153 has been assigned to this vulnerability.
A CVSS v3 base score of 6.1 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)





### BACKGROUND



### MITIGATION

The recommendation is to follow the workaround detailed in the security bulletin until a software update is available.

The security bulletin with detailed workaround can be found at:

https://techsupport.osisoft.com/Troubleshooting/Alerts/AL00312