Trust Center

ControlK

Welcome to the Inductive Automation Trust Portal

Thousands of companies worldwide depend on Ignition
  • See Founder’s Message and Company Leadership
  • Customers, Case Studies, Projects, Discover Gallery
  • SDLC guide. (Duo/CrowdStrike) case studies
  • ** Subscribe to Trust Center Updates ** (below)
  • Vuls/contact: security@inductiveautomation.com (PGP)
ISO 9001 Logo
ISO 9001
ISA 62443 Logo
ISA 62443
ISO/IEC 27001 Logo
ISO/IEC 27001
ISO 14001:2015 Logo
ISO 14001:2015
21 CFR Part 11 Logo
21 CFR Part 11
NIST 800-218 Logo
NIST 800-218
Audit Logging
Data Security
Integrations
View more
Trust Center Updates

CVE-2025-13911 (Ignition Windows Default)

Copy link
Vulnerabilities

If you noticed Ignition CVE-2025-13911, you're probably wondering what this means for you.

The default Ignition installation on Windows grants greater operating system permissions than is needed in most cases. An Ignition administrator importing malicious project resources could lead to a system level compromise or other significant effects.

This Tech Advisory contains more information. Steps #1-#3 correct the issue. The Ignition Security Hardening Guide has been updated with “Appendix A - Restrict the Ignition Service Security” with additional recommendations.

Feel free to reach out to Inductive Automation if you have any additional questions.

CVE‑2025‑55182 (critical React server components vulnerability)

Vulnerabilities

Inductive Automation has verified that CVE‑2025‑55182 (critical React server components vulnerability) does not impact Ignition software, including transitive dependencies. All versions of Ignition and supporting infrastructure are confirmed to be secure.

Shai-Hulud Malware Update (No Threat)

Vulnerabilities

Inductive Automation is not affected by Shai-Hulud related malware activity. Our Software Development Lifecycle includes thorough vetting processes including pinning dependencies. A security team and automated tools are actively monitoring potential impact to Ignition and the software repository.

This attack does not target end users directly. Customers are advised to adhere to the Ignition Security Hardening Guide for best practices. Contact security@inductiveautomation.com with specific questions or concerns.

Trust Portal Updates

General

The IA Security and Trust Portal content has been recently updated to proactively share information. This includes badges for ISO 9001 (Quality) and IEC 62443 (Secure Software Development) certification with downloadable pdf certificates. ISO 27001 (Information Security) and ISO 14001 (Environmental Management) work is underway, with a downloadable letter of commitment for certification in 2026 from our consultant. A 21 CFR Part 11 badge includes an informational guide for using Ignition in pharmaceutical, Life Sciences, or regulated spaces.

Please contact security@inductiveautomation.com with portal update requests.

Recommend upgrading to Ignition 8.1.44+ due to a remediated vulnerability

Vulnerabilities

Ignition customers who are currently using the internal Ignition Identity Provider backed by a user source containing users with RFID badges set are recommended to upgrade to >=8.1.44 due to a remediated vulnerability, assessed with a CVSS v3 score of 8.0, that is exploitable under specific configuration and conditions. The issue was discovered internally. There is no indication of prior public knowledge or exploits

If you think you may have discovered a vulnerability, please send us a note.
Report issue
Built onSafeBase by Drata Logo