Multiple Vulnerabilities in Tridium Niagara Framework

Multiple Vulnerabilities in Tridium Niagara Framework

Researchers identified 13 critical vulnerabilities in Tridium’s widely-deployed Niagara Framework that could allow attackers to compromise building automation systems and collect sensitive network data. 

The vulnerabilities, affecting versions 4.10u10 and earlier, as well as 4.14u1 and earlier, enable attackers with network access to execute sophisticated attack chains resulting in complete system compromise, including root-level remote code execution on target devices.

Key Takeaways
1. Critical flaws discovered in Tridium Niagara Framework affecting building automation systems.
2. Attackers can achieve complete device compromise when encryption is disabled.
3. Updates required to protect critical infrastructure.

Critical Framework Vulnerabilities

According to Nozomi Networks Labs, Tridium Niagara Framework serves as a critical middleware platform connecting diverse IoT devices across building management, industrial automation, and smart infrastructure environments. 

Google News

Multiple Vulnerabilities in Tridium Niagara Framework
 Niagara Workbench main interface

The newly discovered vulnerabilities are consolidated into ten distinct CVEs, with CVE-2025-3937 scoring the highest CVSS v3.1 rating of 7.7 due to insufficient computational effort in password hashing (CWE-916).

The most severe vulnerabilities include CVE-2025-3944 with a CVSS score of 7.2, involving incorrect permission assignment for critical resources, and CVE-2025-3945, also scoring 7.2, which enables argument injection attacks. 

These flaws become fully exploitable when Niagara systems are misconfigured with disabled encryption on network devices, a configuration that generates security dashboard warnings.

Researchers identified an attack chain leveraging CVE-2025-3943 and CVE-2025-3944 that enables adjacent attackers to achieve complete system compromise. 

The attack begins with intercepting anti-CSRF refresh tokens transmitted through GET requests to the /ord endpoint:

Multiple Vulnerabilities in Tridium Niagara Framework
Attacker interacts with the Niagara station
Attacker interacts with the Niagara station

The vulnerability chain allows attackers to extract JSESSIONID session tokens from unencrypted Syslog traffic, escalate privileges, and ultimately exploit CVE-2025-3944 to execute arbitrary code through dhcpd.conf hooks. 

The following proof-of-concept demonstrates root-level code execution:

Multiple Vulnerabilities in Tridium Niagara Framework
CVE ID Title CVSS 3.1 Score Severity
CVE-2025-3937 Use of Password Hash with Insufficient Computational Effort 7.7 High
CVE-2025-3944 Incorrect Permission Assignment for Critical Resource 7.2 High
CVE-2025-3945 Argument Injection 7.2 High
CVE-2025-3938 Missing Cryptographic Step 6.8 Medium
CVE-2025-3936 Incorrect Permission Assignment for Critical Resource 6.5 Medium
CVE-2025-3941 Improper Handling of Windows DATA Alternate Data Stream 5.4 Medium
CVE-2025-3939 Observable Response Discrepancy 5.3 Medium
CVE-2025-3940 Improper Use of Validation Framework 5.3 Medium
CVE-2025-3942 Improper Output Neutralization for Logs 4.3 Medium
CVE-2025-3943 Use of GET Request Method with Sensitive Query Strings 4.1 Medium

Mitigations

Tridium has responded swiftly by issuing security patches and publishing a comprehensive security advisory addressing all identified vulnerabilities. 

The attack prerequisites include Man-in-the-Middle (MiTM) network positioning and misconfigured Syslog functionality transmitting data without encryption.

Organizations operating Niagara-powered systems must immediately update to patched versions and implement network segmentation to limit exposure. 

The vulnerabilities pose significant risks to operational technology environments, potentially enabling lateral movement through T1210 – Exploitation of Remote Services and operational disruptions via T1499 – Endpoint Denial of Service attack techniques.

Given Niagara’s deployment across critical sectors including healthcare, transportation, manufacturing, and energy, these vulnerabilities represent substantial risks to both digital assets and real-world safety systems.

Experience faster, more accurate phishing detection and enhanced protection for your business with real-time sandbox analysis-> Try ANY.RUN now


Source link