ID

VAR-202505-3817


CVE

CVE-2025-3945


TITLE

Tridium  of  Niagara  and  Niagara Enterprise Security  Vulnerability in inserting or changing arguments in

Trust: 0.8

sources: JVNDB: JVNDB-2025-006397

DESCRIPTION

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Tridium Niagara Framework on QNX, Tridium Niagara Enterprise Security on QNX allows Command Delimiters. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.  Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11. (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2025-3945 // JVNDB: JVNDB-2025-006397

AFFECTED PRODUCTS

vendor:tridiummodel:niagara enterprise securityscope:eqversion:4.14u1

Trust: 1.0

vendor:tridiummodel:niagarascope:eqversion:4.15

Trust: 1.0

vendor:tridiummodel:niagara enterprise securityscope:eqversion:4.10u10

Trust: 1.0

vendor:tridiummodel:niagarascope:eqversion:4.14u1

Trust: 1.0

vendor:tridiummodel:niagara enterprise securityscope:eqversion:4.15

Trust: 1.0

vendor:tridiummodel:niagarascope:eqversion:4.10u10

Trust: 1.0

vendor:tridiummodel:niagarascope: - version: -

Trust: 0.8

vendor:tridiummodel:niagara enterprise securityscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2025-006397 // NVD: CVE-2025-3945

CVSS

SEVERITY

CVSSV2

CVSSV3

psirt@honeywell.com: CVE-2025-3945
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2025-3945
value: CRITICAL

Trust: 1.0

NVD: CVE-2025-3945
value: CRITICAL

Trust: 0.8

psirt@honeywell.com: CVE-2025-3945
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-3945
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2025-3945
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2025-006397 // NVD: CVE-2025-3945 // NVD: CVE-2025-3945

PROBLEMTYPE DATA

problemtype:CWE-88

Trust: 1.0

problemtype:Insert or change arguments (CWE-88) [ others ]

Trust: 0.8

problemtype: Insert or change arguments (CWE-88) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-006397 // NVD: CVE-2025-3945

EXTERNAL IDS

db:NVDid:CVE-2025-3945

Trust: 2.6

db:JVNDBid:JVNDB-2025-006397

Trust: 0.8

sources: JVNDB: JVNDB-2025-006397 // NVD: CVE-2025-3945

REFERENCES

url:https://honeywell.com/us/en/product-security#security-notices

Trust: 1.8

url:https://docs.niagara-community.com/category/tech_bull

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-3945

Trust: 0.8

sources: JVNDB: JVNDB-2025-006397 // NVD: CVE-2025-3945

SOURCES

db:JVNDBid:JVNDB-2025-006397
db:NVDid:CVE-2025-3945

LAST UPDATE DATE

2025-06-07T23:41:30.276000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2025-006397date:2025-06-06T07:46:00
db:NVDid:CVE-2025-3945date:2025-06-05T14:19:24.567

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2025-006397date:2025-06-06T00:00:00
db:NVDid:CVE-2025-3945date:2025-05-22T13:15:57.517