Описание
Tridium Niagara AX Framework through 3.6 uses predictable values for (1) session IDs and (2) keys, which might allow remote attackers to bypass authentication via a brute-force attack.
Ссылки
- Broken LinkPatchVendor Advisory
- Broken LinkThird Party AdvisoryUS Government Resource
- Broken LinkPatchVendor Advisory
- Broken LinkThird Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1Версия до 3.6 (включая)
cpe:2.3:a:tridium:niagara_ax:*:*:*:*:*:*:*:*
EPSS
Процентиль: 50%
0.00266
Низкий
5 Medium
CVSS2
Дефекты
CWE-287
Связанные уязвимости
github
больше 3 лет назад
Tridium Niagara AX Framework through 3.6 uses predictable values for (1) session IDs and (2) keys, which might allow remote attackers to bypass authentication via a brute-force attack.
EPSS
Процентиль: 50%
0.00266
Низкий
5 Medium
CVSS2
Дефекты
CWE-287