Tridium Niagara AX Framework through 3.6 uses predictable values for (1) session IDs and (2) keys, which might allow remote attackers to bypass authentication via a brute-force attack.
References
Link | Resource |
---|---|
http://www.tridium.com/cs/tridium_news/security_patch_36 | Broken Link Patch Vendor Advisory |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-228-01.pdf | Broken Link Third Party Advisory US Government Resource |
http://www.tridium.com/cs/tridium_news/security_patch_36 | Broken Link Patch Vendor Advisory |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-228-01.pdf | Broken Link Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 01:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.tridium.com/cs/tridium_news/security_patch_36 - Broken Link, Patch, Vendor Advisory | |
References | () http://www.us-cert.gov/control_systems/pdf/ICSA-12-228-01.pdf - Broken Link, Third Party Advisory, US Government Resource |
Information
Published : 2012-08-16 10:38
Updated : 2024-11-21 01:40
NVD link : CVE-2012-3024
Mitre link : CVE-2012-3024
CVE.ORG link : CVE-2012-3024
JSON object : View
Products Affected
tridium
- niagara_ax
CWE
CWE-287
Improper Authentication