Vulnerability Description
The default configuration of Tridium Niagara AX Framework through 3.6 uses a cleartext base64 format for transmission of credentials in cookies, which allows remote attackers to obtain sensitive information by sniffing the network.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tridium | Niagara Ax | <= 3.6 |
Related Weaknesses (CWE)
References
- http://www.tridium.com/cs/tridium_news/security_patch_36Broken LinkPatchVendor Advisory
- http://www.us-cert.gov/control_systems/pdf/ICSA-12-228-01.pdfBroken LinkThird Party AdvisoryUS Government Resource
- http://www.tridium.com/cs/tridium_news/security_patch_36Broken LinkPatchVendor Advisory
- http://www.us-cert.gov/control_systems/pdf/ICSA-12-228-01.pdfBroken LinkThird Party AdvisoryUS Government Resource
FAQ
What is CVE-2012-3025?
CVE-2012-3025 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The default configuration of Tridium Niagara AX Framework through 3.6 uses a cleartext base64 format for transmission of credentials in cookies, which allows remote attackers to obtain sensitive infor...
How severe is CVE-2012-3025?
CVE-2012-3025 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-3025?
Check the references section above for vendor advisories and patch information. Affected products include: Tridium Niagara Ax.