Use of Password Hash With Insufficient Computational Effort vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Cryptanalysis. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.
References
Link | Resource |
---|---|
https://docs.niagara-community.com/category/tech_bull | Permissions Required |
https://www.honeywell.com/us/en/product-security#security-notices | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
04 Jun 2025, 19:52
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-22 13:15
Updated : 2025-06-04 19:52
NVD link : CVE-2025-3937
Mitre link : CVE-2025-3937
CVE.ORG link : CVE-2025-3937
JSON object : View
Products Affected
blackberry
- qnx
tridium
- niagara_enterprise_security
- niagara
microsoft
- windows
linux
- linux_kernel
CWE
CWE-916
Use of Password Hash With Insufficient Computational Effort