#VU14442 Path traversal in Niagara 4 Framework and Niagara AX Framework


Published: 2018-08-16 | Updated: 2018-08-17

Vulnerability identifier: #VU14442

Vulnerability risk: Low

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-16744

CWE-ID: CWE-22

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Niagara 4 Framework
Universal components / Libraries / Scripting languages
Niagara AX Framework
Universal components / Libraries / Scripting languages

Vendor: Tridium

Description

The vulnerability allows a remote administrative attacker to cause DoS condition on the target system.

The vulnerability exists on Microsoft Windows Systems due to path traversal. A remote attacker can leverage valid platform (administrator) credentials and cause the service to crash or possibly execute arbitrary code.

Mitigation
Update Niagara 4 Framework to version 4.4.92.2.1.
Update Niagara AX Framework to version 3.8.401.

Vulnerable software versions

Niagara 4 Framework: All versions

Niagara AX Framework: All versions


External links
http://ics-cert.us-cert.gov/advisories/ICSA-18-191-03


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability