Tridium Niagara AX Framework through 3.6 uses predictable values for (1) session IDs and (2) keys, which might allow remote attackers to bypass authentication via a brute-force attack.
References
Link | Resource |
---|---|
http://www.tridium.com/cs/tridium_news/security_patch_36 | Broken Link Patch Vendor Advisory |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-228-01.pdf | Broken Link Third Party Advisory US Government Resource |
Configurations
History
No history.
Information
Published : 2012-08-16 10:38
Updated : 2024-02-28 12:00
NVD link : CVE-2012-3024
Mitre link : CVE-2012-3024
CVE.ORG link : CVE-2012-3024
JSON object : View
Products Affected
tridium
- niagara_ax
CWE
CWE-287
Improper Authentication