Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Multiple Vulnerabilities in Tridium Niagara Framework

Posted on July 25, 2025July 25, 2025 By CWS

Researchers recognized 13 essential vulnerabilities in Tridium’s widely-deployed Niagara Framework that would permit attackers to compromise constructing automation methods and acquire delicate community knowledge. 

The vulnerabilities, affecting variations 4.10u10 and earlier, in addition to 4.14u1 and earlier, allow attackers with community entry to execute refined assault chains leading to full system compromise, together with root-level distant code execution on track units.

Key Takeaways1. Vital flaws found in Tridium Niagara Framework affecting constructing automation methods.2. Attackers can obtain full machine compromise when encryption is disabled.3. Updates required to guard essential infrastructure.

Vital Framework Vulnerabilities

In response to Nozomi Networks Labs, Tridium Niagara Framework serves as a essential middleware platform connecting various IoT units throughout constructing administration, industrial automation, and good infrastructure environments. 

 Niagara Workbench important interface

The newly found vulnerabilities are consolidated into ten distinct CVEs, with CVE-2025-3937 scoring the best CVSS v3.1 score of seven.7 on account of inadequate computational effort in password hashing (CWE-916).

Probably the most extreme vulnerabilities embody CVE-2025-3944 with a CVSS rating of seven.2, involving incorrect permission task for essential sources, and CVE-2025-3945, additionally scoring 7.2, which allows argument injection assaults. 

These flaws turn into totally exploitable when Niagara methods are misconfigured with disabled encryption on community units, a configuration that generates safety dashboard warnings.

Researchers recognized an assault chain leveraging CVE-2025-3943 and CVE-2025-3944 that permits adjoining attackers to realize full system compromise. 

The assault begins with intercepting anti-CSRF refresh tokens transmitted by way of GET requests to the /ord endpoint:

Attacker interacts with the Niagara station

The vulnerability chain permits attackers to extract JSESSIONID session tokens from unencrypted Syslog site visitors, escalate privileges, and in the end exploit CVE-2025-3944 to execute arbitrary code by way of dhcpd.conf hooks. 

The next proof-of-concept demonstrates root-level code execution:

CVE IDTitleCVSS 3.1 ScoreSeverityCVE-2025-3937Use of Password Hash with Inadequate Computational Effort7.7HighCVE-2025-3944Incorrect Permission Project for Vital Resource7.2HighCVE-2025-3945Argument Injection7.2HighCVE-2025-3938Missing Cryptographic Step6.8MediumCVE-2025-3936Incorrect Permission Project for Vital Resource6.5MediumCVE-2025-3941Improper Dealing with of Home windows DATA Alternate Information Stream5.4MediumCVE-2025-3939Observable Response Discrepancy5.3MediumCVE-2025-3940Improper Use of Validation Framework5.3MediumCVE-2025-3942Improper Output Neutralization for Logs4.3MediumCVE-2025-3943Use of GET Request Methodology with Delicate Question Strings4.1Medium

Mitigations

Tridium has responded swiftly by issuing safety patches and publishing a complete safety advisory addressing all recognized vulnerabilities. 

The assault conditions embody Man-in-the-Center (MiTM) community positioning and misconfigured Syslog performance transmitting knowledge with out encryption.

Organizations working Niagara-powered methods should instantly replace to patched variations and implement community segmentation to restrict publicity. 

The vulnerabilities pose vital dangers to operational know-how environments, probably enabling lateral motion by way of T1210 – Exploitation of Distant Providers and operational disruptions through T1499 – Endpoint Denial of Service assault strategies.

Given Niagara’s deployment throughout essential sectors together with healthcare, transportation, manufacturing, and vitality, these vulnerabilities symbolize substantial dangers to each digital property and real-world security methods.

Expertise quicker, extra correct phishing detection and enhanced safety for your online business with real-time sandbox analysis-> Attempt ANY.RUN now

Cyber Security News Tags:Framework, Multiple, Niagara, Tridium, Vulnerabilities

Post navigation

Previous Post: In Other News: $30k Google Cloud Build Flaw, Louis Vuitton Breach Update, Attack Surface Growth
Next Post: Microsoft Copilot Rooted to Gain Unauthorized Root Access to its Backend System

Related Posts

CISA Warns of ‘ToolShell’ Exploits Chain Attacks SharePoint Servers Cyber Security News
GitHub Enhances NPM’s Security with Strict Authentication, Granular Tokens, and  Trusted Publishing Cyber Security News
Threat Actors Gaining Access to Victims’ Machines and Monetizing Access to Their Bandwidth Cyber Security News
New ShadowCaptcha Attack Exploiting Hundreds of WordPress Sites to Tricks Victims into Executing Malicious Commands Cyber Security News
17-year-old Hacker Responsible for Vegas Casinos Hack has Been Released Cyber Security News
Microsoft Details Defence Techniques Against Indirect Prompt Injection Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious NuGet Packages Mimic as Popular Nethereum Project to Steal Wallet Keys
  • Microsoft Teams to Auto-Set Work Location by Detecting the Wi-Fi Network
  • $1M WhatsApp Hack Flops: Only Low-Risk Bugs Disclosed to Meta After Pwn2Own Withdrawal
  • OpenAI Atlas Omnibox Is Vulnerable to Jailbreaks
  • AI-Powered Ransomware Is the Emerging Threat That Could Bring Down Your Organization

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious NuGet Packages Mimic as Popular Nethereum Project to Steal Wallet Keys
  • Microsoft Teams to Auto-Set Work Location by Detecting the Wi-Fi Network
  • $1M WhatsApp Hack Flops: Only Low-Risk Bugs Disclosed to Meta After Pwn2Own Withdrawal
  • OpenAI Atlas Omnibox Is Vulnerable to Jailbreaks
  • AI-Powered Ransomware Is the Emerging Threat That Could Bring Down Your Organization

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News