Show filters
11 Total Results
Displaying 1-10 of 11
Sort by:
Attacker Value
Unknown

CVE-2024-1309

Disclosure Date: February 13, 2024 (last updated January 04, 2025)
Uncontrolled Resource Consumption vulnerability in Honeywell Niagara Framework on Windows, Linux, QNX allows Content Spoofing.This issue affects Niagara Framework: before Niagara AX 3.8.1, before Niagara 4.1.
Attacker Value
Unknown

CVE-2020-14483

Disclosure Date: August 13, 2020 (last updated February 21, 2025)
A timeout during a TLS handshake can result in the connection failing to terminate. This can result in a Niagara thread hanging and requires a manual restart of Niagara (Versions 4.6.96.28, 4.7.109.20, 4.7.110.32, 4.8.0.110) and Niagara Enterprise Security (Versions 2.4.31, 2.4.45, 4.8.0.35) to correct.
Attacker Value
Unknown

CVE-2019-13528

Disclosure Date: September 24, 2019 (last updated November 27, 2024)
A specific utility may allow an attacker to gain read access to privileged files in the Niagara AX 3.8u4 (JACE 3e, JACE 6e, JACE 7, JACE-8000), Niagara 4.4u3 (JACE 3e, JACE 6e, JACE 7, JACE-8000), and Niagara 4.7u1 (JACE-8000, Edge 10).
Attacker Value
Unknown

CVE-2018-18985

Disclosure Date: January 29, 2019 (last updated November 27, 2024)
Tridium Niagara Enterprise Security 2.3u1, all versions prior to 2.3.118.6, Niagara AX 3.8u4, all versions prior to 3.8.401.1, Niagara 4.4u2, all versions prior to 4.4.93.40.2, and Niagara 4.6, all versions prior to 4.6.96.28.4 a cross-site scripting vulnerability has been identified that may allow a remote attacker to inject code to some web pages affecting confidentiality.
0
Attacker Value
Unknown

CVE-2017-16744

Disclosure Date: August 20, 2018 (last updated November 27, 2024)
A path traversal vulnerability in Tridium Niagara AX Versions 3.8 and prior and Niagara 4 systems Versions 4.4 and prior installed on Microsoft Windows Systems can be exploited by leveraging valid platform (administrator) credentials.
0
Attacker Value
Unknown

CVE-2017-16748

Disclosure Date: August 20, 2018 (last updated November 27, 2024)
An attacker can log into the local Niagara platform (Niagara AX Framework Versions 3.8 and prior or Niagara 4 Framework Versions 4.4 and prior) using a disabled account name and a blank password, granting the attacker administrator access to the Niagara system.
0
Attacker Value
Unknown

CVE-2012-4701

Disclosure Date: February 15, 2013 (last updated October 05, 2023)
Directory traversal vulnerability in Tridium Niagara AX 3.5, 3.6, and 3.7 allows remote attackers to read sensitive files, and consequently execute arbitrary code, by leveraging (1) valid credentials or (2) the guest feature.
0
Attacker Value
Unknown

CVE-2012-3024

Disclosure Date: August 16, 2012 (last updated October 04, 2023)
Tridium Niagara AX Framework through 3.6 uses predictable values for (1) session IDs and (2) keys, which might allow remote attackers to bypass authentication via a brute-force attack.
0
Attacker Value
Unknown

CVE-2012-3025

Disclosure Date: August 16, 2012 (last updated October 04, 2023)
The default configuration of Tridium Niagara AX Framework through 3.6 uses a cleartext base64 format for transmission of credentials in cookies, which allows remote attackers to obtain sensitive information by sniffing the network.
0
Attacker Value
Unknown

CVE-2012-4027

Disclosure Date: July 16, 2012 (last updated October 04, 2023)
Directory traversal vulnerability in Tridium Niagara AX Framework allows remote attackers to read files outside of the intended images, nav, and px folders by leveraging incorrect permissions, as demonstrated by reading the config.bog file.
0