Use of Password Hash With Insufficient Computational Effort vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Cryptanalysis. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.
References
| Link | Resource |
|---|---|
| https://docs.niagara-community.com/category/tech_bull | Permissions Required |
| https://www.honeywell.com/us/en/product-security#security-notices | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-05-22 13:15
Updated : 2025-06-04 19:52
NVD link : CVE-2025-3937
Mitre link : CVE-2025-3937
CVE.ORG link : CVE-2025-3937
JSON object : View
Products Affected
linux
- linux_kernel
blackberry
- qnx
microsoft
- windows
tridium
- niagara_enterprise_security
- niagara
CWE
CWE-916
Use of Password Hash With Insufficient Computational Effort
