Tridium Niagara AX Path Traversal (CVE-2012-4027)

high Tenable OT Security Plugin ID 500894

Synopsis

The remote OT asset is affected by a vulnerability.

Description

Directory traversal vulnerability in Tridium Niagara AX Framework allows remote attackers to read files outside of the intended images, nav, and px folders by leveraging incorrect permissions, as demonstrated by reading the config.bog file.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

http://www.nessus.org/u?d7272d7a

http://www.nessus.org/u?53b5abf7

http://www.nessus.org/u?8b0726e5

http://www.nessus.org/u?3e6155d6

Plugin Details

Severity: High

ID: 500894

Version: 1.4

Type: remote

Family: Tenable.ot

Published: 3/21/2023

Updated: 10/17/2023

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2012-4027

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:tridium:niagara_ax_framework

Required KB Items: Tenable.ot/assetBag

Exploit Ease: No known exploits are available

Patch Publication Date: 7/16/2012

Vulnerability Publication Date: 7/16/2012

Reference Information

CVE: CVE-2012-4027

CWE: 264