ID

VAR-202505-3274


CVE

CVE-2025-3941


TITLE

Tridium  of  Niagara  and  Niagara Enterprise Security  Incorrectly resolved name and reference usage vulnerabilities in

Trust: 0.8

sources: JVNDB: JVNDB-2025-006234

DESCRIPTION

Improper Handling of Windows ::DATA Alternate Data Stream vulnerability in Tridium Niagara Framework on Windows, Tridium Niagara Enterprise Security on Windows allows Input Data Manipulation. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11. Tridium of Niagara and Niagara Enterprise Security There is a vulnerability in the use of incorrectly resolved names and references.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2025-3941 // JVNDB: JVNDB-2025-006234

AFFECTED PRODUCTS

vendor:tridiummodel:niagarascope:eqversion:4.10u10

Trust: 1.0

vendor:tridiummodel:niagarascope:eqversion:4.15

Trust: 1.0

vendor:tridiummodel:niagara enterprise securityscope:eqversion:4.10u10

Trust: 1.0

vendor:tridiummodel:niagarascope:eqversion:4.14u1

Trust: 1.0

vendor:tridiummodel:niagara enterprise securityscope:eqversion:4.15

Trust: 1.0

vendor:tridiummodel:niagara enterprise securityscope:eqversion:4.14u1

Trust: 1.0

vendor:tridiummodel:niagara enterprise securityscope: - version: -

Trust: 0.8

vendor:tridiummodel:niagarascope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2025-006234 // NVD: CVE-2025-3941

CVSS

SEVERITY

CVSSV2

CVSSV3

psirt@honeywell.com: CVE-2025-3941
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2025-3941
value: CRITICAL

Trust: 1.0

NVD: CVE-2025-3941
value: CRITICAL

Trust: 0.8

psirt@honeywell.com: CVE-2025-3941
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.5
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-3941
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2025-3941
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2025-006234 // NVD: CVE-2025-3941 // NVD: CVE-2025-3941

PROBLEMTYPE DATA

problemtype:CWE-69

Trust: 1.0

problemtype:CWE-706

Trust: 1.0

problemtype:ADS Improper handling of (CWE-69) [ others ]

Trust: 0.8

problemtype: Use of incorrectly resolved names and references (CWE-706) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-006234 // NVD: CVE-2025-3941

EXTERNAL IDS

db:NVDid:CVE-2025-3941

Trust: 2.6

db:JVNDBid:JVNDB-2025-006234

Trust: 0.8

sources: JVNDB: JVNDB-2025-006234 // NVD: CVE-2025-3941

REFERENCES

url:https://www.honeywell.com/us/en/product-security#security-notices

Trust: 1.8

url:https://docs.niagara-community.com/category/tech_bull

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-3941

Trust: 0.8

sources: JVNDB: JVNDB-2025-006234 // NVD: CVE-2025-3941

SOURCES

db:JVNDBid:JVNDB-2025-006234
db:NVDid:CVE-2025-3941

LAST UPDATE DATE

2025-06-06T23:10:39.993000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2025-006234date:2025-06-05T01:31:00
db:NVDid:CVE-2025-3941date:2025-06-04T19:28:23.770

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2025-006234date:2025-06-05T00:00:00
db:NVDid:CVE-2025-3941date:2025-05-22T13:15:57