Tridium Niagara AX Framework through 3.6 uses predictable values for (1) session IDs and (2) keys, which might allow remote attackers to bypass authentication via a brute-force attack.
References
Link | Resource |
---|---|
http://www.tridium.com/cs/tridium_news/security_patch_36 | Broken Link Patch Vendor Advisory |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-228-01.pdf | Broken Link Third Party Advisory US Government Resource |
Configurations
History
22 Mar 2023, 14:08
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:tridium:niagra_ax_framework:3.5:*:*:*:*:*:*:* |
cpe:2.3:a:tridium:niagara_ax:*:*:*:*:*:*:*:* |
References | (CONFIRM) http://www.tridium.com/cs/tridium_news/security_patch_36 - Broken Link, Patch, Vendor Advisory | |
References | (MISC) http://www.us-cert.gov/control_systems/pdf/ICSA-12-228-01.pdf - Broken Link, Third Party Advisory, US Government Resource |
Information
Published : 2012-08-16 10:38
Updated : 2024-02-04 18:16
NVD link : CVE-2012-3024
Mitre link : CVE-2012-3024
CVE.ORG link : CVE-2012-3024
JSON object : View
Products Affected
tridium
- niagara_ax
CWE
CWE-287
Improper Authentication