CVE-2025-3943

4.1 MEDIUM

📋 TL;DR

This vulnerability in Tridium Niagara Framework and Enterprise Security allows attackers to inject parameters through GET requests with sensitive query strings. It affects systems running vulnerable versions on Windows, Linux, and QNX operating systems. Successful exploitation could lead to unauthorized access or manipulation of system parameters.

💻 Affected Systems

Products:
  • Tridium Niagara Framework
  • Tridium Niagara Enterprise Security
Versions: Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11
Operating Systems: Windows, Linux, QNX
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject malicious parameters to bypass authentication, access sensitive data, or manipulate system configurations leading to full system compromise.

🟠

Likely Case

Parameter manipulation allowing unauthorized access to restricted functionality or data exposure.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

GET request manipulation is a common attack vector with low technical barrier.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11

Vendor Advisory: https://docs.niagara-community.com/category/tech_bull

Restart Required: Yes

Instructions:

1. Download the appropriate patch version from Tridium/Honeywell support portal. 2. Backup current configuration and data. 3. Apply the patch following vendor instructions. 4. Restart the Niagara service or system. 5. Verify successful update.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block or sanitize suspicious GET requests with parameter injection patterns.

Network Segmentation

all

Restrict access to Niagara systems to authorized networks only.

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Deploy web application firewall with parameter injection detection rules

🔍 How to Verify

Check if Vulnerable:

Check Niagara version via web interface or configuration files against affected version ranges.

Check Version:

Check Niagara web interface or configuration files for version information.

Verify Fix Applied:

Confirm version is updated to 4.14.2u2, 4.15.u1, or 4.10u.11 and test GET request handling.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET requests with parameter manipulation patterns
  • Failed authentication attempts followed by parameter injection attempts

Network Indicators:

  • HTTP GET requests with unusual parameter strings or injection patterns
  • Requests from unexpected sources to Niagara endpoints

SIEM Query:

source="niagara" AND (http_method="GET" AND (url CONTAINS "?" AND (url CONTAINS "inject" OR url CONTAINS "malicious" OR parameter_count > normal)))

🔗 References

📤 Share & Export