Cpe Name:
cpe:2.3:a:tridium:niagra_ax_framework:*:*:*:*:*:*:*:*
# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2012-4028 |
255 |
|
Bypass |
2012-07-16 |
2012-12-04 |
7.8 |
None |
Remote |
Low |
Not required |
Complete |
None |
None |
Tridium Niagara AX Framework does not properly store credential data, which allows context-dependent attackers to bypass intended access restrictions by using the stored information for authentication. |
2 |
CVE-2012-4027 |
264 |
|
Dir. Trav. |
2012-07-16 |
2012-07-17 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Directory traversal vulnerability in Tridium Niagara AX Framework allows remote attackers to read files outside of the intended images, nav, and px folders by leveraging incorrect permissions, as demonstrated by reading the config.bog file. |
3 |
CVE-2012-3025 |
310 |
|
+Info |
2012-08-16 |
2012-08-16 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
The default configuration of Tridium Niagara AX Framework through 3.6 uses a cleartext base64 format for transmission of credentials in cookies, which allows remote attackers to obtain sensitive information by sniffing the network. |
4 |
CVE-2012-3024 |
287 |
|
Bypass |
2012-08-16 |
2012-08-16 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
Tridium Niagara AX Framework through 3.6 uses predictable values for (1) session IDs and (2) keys, which might allow remote attackers to bypass authentication via a brute-force attack. |
Total number of vulnerabilities :
4
Page :
1
(This Page)