Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Multiple Vulnerabilities in Tridium Niagara Framework

Posted on July 25, 2025July 25, 2025 By CWS

Researchers recognized 13 essential vulnerabilities in Tridium’s widely-deployed Niagara Framework that would permit attackers to compromise constructing automation methods and acquire delicate community knowledge. 

The vulnerabilities, affecting variations 4.10u10 and earlier, in addition to 4.14u1 and earlier, allow attackers with community entry to execute refined assault chains leading to full system compromise, together with root-level distant code execution on track units.

Key Takeaways1. Vital flaws found in Tridium Niagara Framework affecting constructing automation methods.2. Attackers can obtain full machine compromise when encryption is disabled.3. Updates required to guard essential infrastructure.

Vital Framework Vulnerabilities

In response to Nozomi Networks Labs, Tridium Niagara Framework serves as a essential middleware platform connecting various IoT units throughout constructing administration, industrial automation, and good infrastructure environments. 

 Niagara Workbench important interface

The newly found vulnerabilities are consolidated into ten distinct CVEs, with CVE-2025-3937 scoring the best CVSS v3.1 score of seven.7 on account of inadequate computational effort in password hashing (CWE-916).

Probably the most extreme vulnerabilities embody CVE-2025-3944 with a CVSS rating of seven.2, involving incorrect permission task for essential sources, and CVE-2025-3945, additionally scoring 7.2, which allows argument injection assaults. 

These flaws turn into totally exploitable when Niagara methods are misconfigured with disabled encryption on community units, a configuration that generates safety dashboard warnings.

Researchers recognized an assault chain leveraging CVE-2025-3943 and CVE-2025-3944 that permits adjoining attackers to realize full system compromise. 

The assault begins with intercepting anti-CSRF refresh tokens transmitted by way of GET requests to the /ord endpoint:

Attacker interacts with the Niagara station

The vulnerability chain permits attackers to extract JSESSIONID session tokens from unencrypted Syslog site visitors, escalate privileges, and in the end exploit CVE-2025-3944 to execute arbitrary code by way of dhcpd.conf hooks. 

The next proof-of-concept demonstrates root-level code execution:

CVE IDTitleCVSS 3.1 ScoreSeverityCVE-2025-3937Use of Password Hash with Inadequate Computational Effort7.7HighCVE-2025-3944Incorrect Permission Project for Vital Resource7.2HighCVE-2025-3945Argument Injection7.2HighCVE-2025-3938Missing Cryptographic Step6.8MediumCVE-2025-3936Incorrect Permission Project for Vital Resource6.5MediumCVE-2025-3941Improper Dealing with of Home windows DATA Alternate Information Stream5.4MediumCVE-2025-3939Observable Response Discrepancy5.3MediumCVE-2025-3940Improper Use of Validation Framework5.3MediumCVE-2025-3942Improper Output Neutralization for Logs4.3MediumCVE-2025-3943Use of GET Request Methodology with Delicate Question Strings4.1Medium

Mitigations

Tridium has responded swiftly by issuing safety patches and publishing a complete safety advisory addressing all recognized vulnerabilities. 

The assault conditions embody Man-in-the-Center (MiTM) community positioning and misconfigured Syslog performance transmitting knowledge with out encryption.

Organizations working Niagara-powered methods should instantly replace to patched variations and implement community segmentation to restrict publicity. 

The vulnerabilities pose vital dangers to operational know-how environments, probably enabling lateral motion by way of T1210 – Exploitation of Distant Providers and operational disruptions through T1499 – Endpoint Denial of Service assault strategies.

Given Niagara’s deployment throughout essential sectors together with healthcare, transportation, manufacturing, and vitality, these vulnerabilities symbolize substantial dangers to each digital property and real-world security methods.

Expertise quicker, extra correct phishing detection and enhanced safety for your online business with real-time sandbox analysis-> Attempt ANY.RUN now

Cyber Security News Tags:Framework, Multiple, Niagara, Tridium, Vulnerabilities

Post navigation

Previous Post: In Other News: $30k Google Cloud Build Flaw, Louis Vuitton Breach Update, Attack Surface Growth
Next Post: Microsoft Copilot Rooted to Gain Unauthorized Root Access to its Backend System

Related Posts

Cisco Warns of Identity Services Engine RCE Vulnerability Exploited in the Wild Cyber Security News
APT36 Attacking BOSS Linux Systems With Weaponized ZIP Files to Steal Sensitive Data Cyber Security News
Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks Cyber Security News
Louis Vuitton Hacked – Attackers Stolen Customers Personal Data Cyber Security News
Hackers Exploit SimpleHelp RMM Tool to Deploy DragonForce Ransomware Cyber Security News
Infostealers Actively Attacking macOS Users in The Wild to Steal Sensitive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 15 Best Docker Monitoring Tools in 2025
  • 20 Best SNMP Monitoring Tools in 2025
  • Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware
  • Infamous BreachForums Is Back Online With All Accounts and Posts Restored
  • Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 15 Best Docker Monitoring Tools in 2025
  • 20 Best SNMP Monitoring Tools in 2025
  • Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware
  • Infamous BreachForums Is Back Online With All Accounts and Posts Restored
  • Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News