Denial of service in Tridium Niagara



Published: 2020-08-12
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-14483
CWE-ID CWE-1088
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
Niagara
Server applications / SCADA systems

Niagara Enterprise Security
Server applications / SCADA systems

Vendor Tridium

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Synchronous Access of Remote Resource without Timeout

EUVDB-ID: #VU45636

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-14483

CWE-ID: CWE-1088 - Synchronous Access of Remote Resource without Timeout

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a timeout during a TLS handshake can result in the connection failing to terminate. A remote attacker on the local network can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Niagara: 4.6.96.28 - 4.8.0.110

Niagara Enterprise Security: 2.4.31 - 4.8.0.35

External links

http://ics-cert.us-cert.gov/advisories/icsa-20-224-03


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###