Tridium Niagara
Tridium Niagara controllers contain privilege escalation vulnerabilities (CWE-200, CWE-285) that allow a local user to gain administrative control. The vulnerabilities affect Niagara AX 3.8u4, Niagara 4.4u3, and Niagara 4.7u1 running on JACE-3e, JACE-6e, JACE-7, JACE-8000, and Edge 10 devices. These vulnerabilities are not remotely exploitable and require local system access or physical access to the device. Tridium has released mitigated versions with updated OS and NRE Config distributions for each affected product line.
- Physical access to the Niagara JACE device or existing local user account on the system
- Low-level access to the operating system shell or ability to interact with local services
- The affected versions: Niagara AX 3.8u4, Niagara 4.4u3, or Niagara 4.7u1
Patching may require device reboot — plan for process interruption
/api/v1/advisories/515038b3-2ed3-4198-8bd8-b31ec4f5be10Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.