Vulnerability identifier: #VU14443
Vulnerability risk: Low
CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-287
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Niagara 4 Framework
Universal components / Libraries /
Scripting languages
Niagara AX Framework
Universal components / Libraries /
Scripting languages
Vendor: Tridium
Description
The vulnerability allows a local unauthenticated attacker to bypass authentication on the target system.
The vulnerability exists on Microsoft Windows Systems due to improper authentication. A local attacker can use a disabled account name and a blank password, log into the local Niagara platform and gain administrator access to the Niagara system.
Mitigation
Update Niagara 4 Framework to version 4.4.92.2.1.
Update Niagara AX Framework to version 3.8.401.
Vulnerable software versions
Niagara 4 Framework: All versions
Niagara AX Framework: All versions
External links
http://ics-cert.us-cert.gov/advisories/ICSA-18-191-03
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.