CVE-2012-4028

Tridium Niagara AX Framework does not properly store credential data, which allows context-dependent attackers to bypass intended access restrictions by using the stored information for authentication.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tridium:niagara_ax:*:*:*:*:*:*:*:*

History

22 Mar 2023, 14:10

Type Values Removed Values Added
CWE CWE-255 CWE-522
CPE cpe:2.3:a:tridium:niagra_ax_framework:*:*:*:*:*:*:*:* cpe:2.3:a:tridium:niagara_ax:*:*:*:*:*:*:*:*
References (CONFIRM) https://www.tridium.com/galleries/briefings/NiagaraAX_Framework_Software_Security_Alert.pdf - Vendor Advisory (CONFIRM) https://www.tridium.com/galleries/briefings/NiagaraAX_Framework_Software_Security_Alert.pdf - Broken Link, Vendor Advisory
References (MISC) http://www.washingtonpost.com/investigations/tridiums-niagara-framework-marvel-of-connectivity-illustrates-new-cyber-risks/2012/07/11/gJQARJL6dW_story.html - (MISC) http://www.washingtonpost.com/investigations/tridiums-niagara-framework-marvel-of-connectivity-illustrates-new-cyber-risks/2012/07/11/gJQARJL6dW_story.html - Permissions Required

Information

Published : 2012-07-16 20:55

Updated : 2024-02-04 18:16


NVD link : CVE-2012-4028

Mitre link : CVE-2012-4028

CVE.ORG link : CVE-2012-4028


JSON object : View

Products Affected

tridium

  • niagara_ax
CWE
CWE-522

Insufficiently Protected Credentials