ID

VAR-201808-0129


CVE

CVE-2017-16748


TITLE

Niagara Authentication vulnerabilities in the platform

Trust: 0.8

sources: JVNDB: JVNDB-2018-009181

DESCRIPTION

An attacker can log into the local Niagara platform (Niagara AX Framework Versions 3.8 and prior or Niagara 4 Framework Versions 4.4 and prior) using a disabled account name and a blank password, granting the attacker administrator access to the Niagara system. Niagara The platform contains authentication vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Tridium Niagara AX Framework and Niagara 4 Framework are both IoT business application frameworks from Tridium. Tridium Niagara is prone to directory-traversal vulnerability and authentication-bypass vulnerability because the application fails to sufficiently sanitize user-supplied input. Exploiting these issues may allow an attacker to bypass authentication and perform unauthorized actions on the affected application, and to obtain sensitive information that could aid in further attacks

Trust: 3.24

sources: NVD: CVE-2017-16748 // JVNDB: JVNDB-2018-009181 // CNVD: CNVD-2018-15732 // CNNVD: CNNVD-201808-569 // BID: 105101 // IVD: e2f81210-39ab-11e9-ad51-000c29342cb1 // VULMON: CVE-2017-16748

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: e2f81210-39ab-11e9-ad51-000c29342cb1 // CNVD: CNVD-2018-15732

AFFECTED PRODUCTS

vendor:tridiummodel:niagarascope:lteversion:4.4

Trust: 1.8

vendor:tridiummodel:niagara ax frameworkscope:lteversion:3.8

Trust: 1.8

vendor:tridiummodel:niagara ax frameworkscope:eqversion:3.8

Trust: 0.9

vendor:tridiummodel:niagara ax frameworkscope:lteversion:<=3.8

Trust: 0.6

vendor:tridiummodel:niagara frameworkscope:eqversion:4<=4.4

Trust: 0.6

vendor:tridiummodel:niagarascope:eqversion:4.4

Trust: 0.6

vendor:tridiummodel:frameworkscope:eqversion:44.4

Trust: 0.3

vendor:niagaramodel: - scope:eqversion:*

Trust: 0.2

vendor:niagara ax frameworkmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: e2f81210-39ab-11e9-ad51-000c29342cb1 // CNVD: CNVD-2018-15732 // BID: 105101 // JVNDB: JVNDB-2018-009181 // CNNVD: CNNVD-201808-569 // NVD: CVE-2017-16748

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-16748
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-16748
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2018-15732
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201808-569
value: CRITICAL

Trust: 0.6

IVD: e2f81210-39ab-11e9-ad51-000c29342cb1
value: CRITICAL

Trust: 0.2

VULMON: CVE-2017-16748
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-16748
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2018-15732
severity: MEDIUM
baseScore: 6.2
vectorString: AV:L/AC:H/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 1.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2f81210-39ab-11e9-ad51-000c29342cb1
severity: MEDIUM
baseScore: 6.2
vectorString: AV:L/AC:H/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 1.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2017-16748
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: e2f81210-39ab-11e9-ad51-000c29342cb1 // CNVD: CNVD-2018-15732 // VULMON: CVE-2017-16748 // JVNDB: JVNDB-2018-009181 // CNNVD: CNNVD-201808-569 // NVD: CVE-2017-16748

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.8

sources: JVNDB: JVNDB-2018-009181 // NVD: CVE-2017-16748

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201808-569

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201808-569

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-009181

PATCH

title:Top Pageurl:https://www.tridium.com/

Trust: 0.8

title:Patch for Tridium Niagara AX Framework and Niagara 4 Framework Authentication Bypass Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/138005

Trust: 0.6

title:Tridium Niagara AX Framework and Niagara 4 Framework Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=84155

Trust: 0.6

title:CVE-2017-16744-and-CVE-2017-16748-Tridium-Niagaraurl:https://github.com/GainSec/CVE-2017-16744-and-CVE-2017-16748-Tridium-Niagara

Trust: 0.1

title: - url:https://github.com/khulnasoft-labs/awesome-security

Trust: 0.1

sources: CNVD: CNVD-2018-15732 // VULMON: CVE-2017-16748 // JVNDB: JVNDB-2018-009181 // CNNVD: CNNVD-201808-569

EXTERNAL IDS

db:NVDid:CVE-2017-16748

Trust: 3.6

db:ICS CERTid:ICSA-18-191-03

Trust: 3.4

db:ICS CERTid:ICSA-19-022-01

Trust: 2.8

db:BIDid:105101

Trust: 2.0

db:CNVDid:CNVD-2018-15732

Trust: 0.8

db:CNNVDid:CNNVD-201808-569

Trust: 0.8

db:JVNDBid:JVNDB-2018-009181

Trust: 0.8

db:IVDid:E2F81210-39AB-11E9-AD51-000C29342CB1

Trust: 0.2

db:VULMONid:CVE-2017-16748

Trust: 0.1

sources: IVD: e2f81210-39ab-11e9-ad51-000c29342cb1 // CNVD: CNVD-2018-15732 // VULMON: CVE-2017-16748 // BID: 105101 // JVNDB: JVNDB-2018-009181 // CNNVD: CNNVD-201808-569 // NVD: CVE-2017-16748

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-18-191-03

Trust: 3.4

url:https://ics-cert.us-cert.gov/advisories/icsa-19-022-01

Trust: 2.9

url:http://www.securityfocus.com/bid/105101

Trust: 2.3

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-16748

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-16748

Trust: 0.8

url:https://www.tridium.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/gainsec/cve-2017-16744-and-cve-2017-16748-tridium-niagara

Trust: 0.1

sources: CNVD: CNVD-2018-15732 // VULMON: CVE-2017-16748 // BID: 105101 // JVNDB: JVNDB-2018-009181 // CNNVD: CNNVD-201808-569 // NVD: CVE-2017-16748

CREDITS

Johnathan Gains and Leet Cyber Security.

Trust: 0.9

sources: BID: 105101 // CNNVD: CNNVD-201808-569

SOURCES

db:IVDid:e2f81210-39ab-11e9-ad51-000c29342cb1
db:CNVDid:CNVD-2018-15732
db:VULMONid:CVE-2017-16748
db:BIDid:105101
db:JVNDBid:JVNDB-2018-009181
db:CNNVDid:CNNVD-201808-569
db:NVDid:CVE-2017-16748

LAST UPDATE DATE

2024-11-23T22:06:39.490000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-15732date:2018-08-21T00:00:00
db:VULMONid:CVE-2017-16748date:2019-04-03T00:00:00
db:BIDid:105101date:2019-01-23T07:00:00
db:JVNDBid:JVNDB-2018-009181date:2019-01-23T00:00:00
db:CNNVDid:CNNVD-201808-569date:2019-04-04T00:00:00
db:NVDid:CVE-2017-16748date:2024-11-21T03:16:53.670

SOURCES RELEASE DATE

db:IVDid:e2f81210-39ab-11e9-ad51-000c29342cb1date:2018-08-21T00:00:00
db:CNVDid:CNVD-2018-15732date:2018-08-21T00:00:00
db:VULMONid:CVE-2017-16748date:2018-08-20T00:00:00
db:BIDid:105101date:2018-08-16T00:00:00
db:JVNDBid:JVNDB-2018-009181date:2018-11-09T00:00:00
db:CNNVDid:CNNVD-201808-569date:2018-08-20T00:00:00
db:NVDid:CVE-2017-16748date:2018-08-20T21:29:00.807