Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Flaw Found in OSIsoft Product Deployed in Critical Infrastructure Sectors

OSIsoft Resolves Security Bypass Vulnerability in PI AF Product

OSIsoft customers are advised to take steps to mitigate an incorrect default permissions vulnerability affecting the PI Asset Framework (PI AF) product.

OSIsoft Resolves Security Bypass Vulnerability in PI AF Product

OSIsoft customers are advised to take steps to mitigate an incorrect default permissions vulnerability affecting the PI Asset Framework (PI AF) product.

OSIsoft is a San Leandro, CA-based company that provides operational intelligence solutions. The company’s flagship product, PI System, is designed to enable organizations to capture sensor-based data and leverage it to improve efficiency, quality, sustainability, and safety.Osisoft

PI AF is a tool that acts as a repository for an organization’s assets and equipment. The product, which uses Microsoft SQL Server databases, is deployed in various critical infrastructure sectors across the world.

According to advisories published by ICS-CERT and OSIsoft, PI AF is plagued by a vulnerability that allows a remote attacker to execute arbitrary SQL statements on the affected system. This could lead to information disclosure, data tampering, privilege elevation, and denial-of-service (DoS), OSIsoft said.

“Some product installations insert the ‘Everyone’ account in the ‘PI SQL (AF) Trusted Users’ group on the PI AF Server. Users in the ‘PI SQL (AF) Trusted Users’ group can bypass most of the security checks that would normally be applied to various types of SQL statements, and can execute commands on the PI AF SQL Database without authorization,” the company wrote in its advisory.

The bug affects products that can add the problematic “Everyone” account, including PI AF Server 2.6 and PI SQL for AF 2.1. The vulnerability has been assigned the CVE identifier CVE-2015-1013 and a CVSS score of 6.5.

The steps PI AF customers must take in order to address the security bug depends on the PI WebParts version that is installed. If PI WebParts 2013 or later is installed, users must simply remove the “PI SQL (AF) Trusted Users” group from the AF Server.

Users of WebParts 2010 (or 2010 R2) can update to the 2013 version or later, and then remove the “PI SQL (AF) Trusted Users” group. Alternatively, users of older versions can remove the “Everyone” user from the “PI SQL (AF) Trusted Users” group, and add a certain account to the Windows group depending on how the SharePoint application pool hosting PI WebParts is running. With older versions of PI WebParts, removing the “Everyone” group could cause errors, OSIsoft noted.

Advertisement. Scroll to continue reading.

If the WebParts component is not present, users can simply remove the “PI SQL (AF) Trusted Users” group from the AF server.

While there is no evidence that the vulnerability has been exploited in the wild, ICS-CERT noted that even an attacker with low skill can exploit the flaw.

Related: Learn more at the ICS Cyber Security Conference

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.