Improper Handling of Windows ::DATA Alternate Data Stream vulnerability in Tridium Niagara Framework on Windows, Tridium Niagara Enterprise Security on Windows allows Input Data Manipulation. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.
Metrics
Affected Vendors & Products
References
History
Wed, 04 Jun 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Microsoft
Microsoft windows Tridium Tridium niagara Tridium niagara Enterprise Security |
|
Weaknesses | CWE-706 | |
CPEs | cpe:2.3:a:tridium:niagara:4.10u10:*:*:*:*:*:*:* cpe:2.3:a:tridium:niagara:4.14u1:*:*:*:*:*:*:* cpe:2.3:a:tridium:niagara:4.15:*:*:*:*:*:*:* cpe:2.3:a:tridium:niagara_enterprise_security:4.10u10:*:*:*:*:*:*:* cpe:2.3:a:tridium:niagara_enterprise_security:4.14u1:*:*:*:*:*:*:* cpe:2.3:a:tridium:niagara_enterprise_security:4.15:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Microsoft
Microsoft windows Tridium Tridium niagara Tridium niagara Enterprise Security |
Thu, 22 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 22 May 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper Handling of Windows ::DATA Alternate Data Stream vulnerability in Tridium Niagara Framework on Windows, Tridium Niagara Enterprise Security on Windows allows Input Data Manipulation. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11. | |
Title | Improper Handling of Windows: DATA Alternate Data Stream | |
Weaknesses | CWE-69 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Honeywell
Published: 2025-05-22T12:38:15.750Z
Updated: 2025-05-22T13:52:36.314Z
Reserved: 2025-04-25T15:21:18.048Z
Link: CVE-2025-3941

Updated: 2025-05-22T13:50:01.373Z

Status : Analyzed
Published: 2025-05-22T13:15:57.000
Modified: 2025-06-04T19:28:23.770
Link: CVE-2025-3941

No data.