#VU14443 Improper authentication in Niagara 4 Framework and Niagara AX Framework


Published: 2018-08-17

Vulnerability identifier: #VU14443

Vulnerability risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-16748

CWE-ID: CWE-287

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Niagara 4 Framework
Universal components / Libraries / Scripting languages
Niagara AX Framework
Universal components / Libraries / Scripting languages

Vendor: Tridium

Description

The vulnerability allows a local unauthenticated attacker to bypass authentication on the target system.

The vulnerability exists on Microsoft Windows Systems due to improper authentication. A local attacker can use a disabled account name and a blank password, log into the local Niagara platform and gain administrator access to the Niagara system.

Mitigation
Update Niagara 4 Framework to version 4.4.92.2.1.
Update Niagara AX Framework to version 3.8.401.

Vulnerable software versions

Niagara 4 Framework: All versions

Niagara AX Framework: All versions


External links
http://ics-cert.us-cert.gov/advisories/ICSA-18-191-03


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability