The default configuration of Tridium Niagara AX Framework through 3.6 uses a cleartext base64 format for transmission of credentials in cookies, which allows remote attackers to obtain sensitive information by sniffing the network.
References
Link | Resource |
---|---|
http://www.tridium.com/cs/tridium_news/security_patch_36 | Broken Link Patch Vendor Advisory |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-228-01.pdf | Broken Link Third Party Advisory US Government Resource |
http://www.tridium.com/cs/tridium_news/security_patch_36 | Broken Link Patch Vendor Advisory |
http://www.us-cert.gov/control_systems/pdf/ICSA-12-228-01.pdf | Broken Link Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 01:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.tridium.com/cs/tridium_news/security_patch_36 - Broken Link, Patch, Vendor Advisory | |
References | () http://www.us-cert.gov/control_systems/pdf/ICSA-12-228-01.pdf - Broken Link, Third Party Advisory, US Government Resource |
Information
Published : 2012-08-16 10:38
Updated : 2024-11-21 01:40
NVD link : CVE-2012-3025
Mitre link : CVE-2012-3025
CVE.ORG link : CVE-2012-3025
JSON object : View
Products Affected
tridium
- niagara_ax
CWE
CWE-522
Insufficiently Protected Credentials