WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Inductive Automation Ignition (Update B) (ICSA-20-147-01) – Product Used in the Energy Sector
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Inductive Automation Ignition (Update B) (ICSA-20-147-01) – Product Used in the Energy Sector

Author: Charles Egli

Created: Wednesday, July 1, 2020 - 13:00

Categories: Cybersecurity

June 30, 2020

CISA has updated this advisory with additional details on the affected products and mitigation measures. Read the advisory at CISA.

June 2, 2020

CISA has updated this advisory with additional details of the affected products. Read the advisory at CISA.

May 28, 2020

CISA has published an advisory on missing authentication for critical function and deserialization of untrusted data vulnerabilities in Inductive Automation Ignition. Inductive Automation Ignition 8 Gateway versions prior to 8.0.10 are affected. Successful exploitation of these vulnerabilities could allow an attacker to obtain sensitive information and perform remote code execution with SYSTEM privileges. Inductive Automation recommends upgrading the Ignition software to v8.0.10. CISA also recommends a series of measures to mitigate the vulnerabilities. Read the advisory at CISA.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar