{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-3943","assignerOrgId":"0dc86260-d7e3-4e81-ba06-3508e030ce8d","state":"PUBLISHED","assignerShortName":"Honeywell","dateReserved":"2025-04-25T15:21:19.481Z","datePublished":"2025-05-22T12:42:13.893Z","dateUpdated":"2025-05-22T13:19:08.477Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","platforms":["Windows","Linux","QNX"],"product":"Niagara Framework","vendor":"Tridium","versions":[{"lessThan":"4.14.2","status":"affected","version":"0","versionType":"custom"},{"lessThan":"4.15.1","status":"affected","version":"0","versionType":"custom"},{"lessThan":"4.10.11","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"affected","platforms":["Windows","Linux","QNX"],"product":"Niagara Enterprise Security","vendor":"Tridium","versions":[{"lessThan":"4.14.2","status":"affected","version":"0","versionType":"custom"},{"lessThan":"4.15.1","status":"affected","version":"0","versionType":"custom"},{"lessThan":"4.10.11","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"reporter","value":"Andrea Palanca and team at Nozomi Network"}],"datePublic":"2025-05-08T16:59:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Use of GET Request Method With Sensitive Query Strings vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Parameter Injection. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11.&nbsp;Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.<br><br>"}],"value":"Use of GET Request Method With Sensitive Query Strings vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Parameter Injection. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11."}],"impacts":[{"capecId":"CAPEC-137","descriptions":[{"lang":"en","value":"CAPEC-137 Parameter Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-598","description":"CWE-598 Use of GET Request Method With Sensitive Query Strings","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"0dc86260-d7e3-4e81-ba06-3508e030ce8d","shortName":"Honeywell","dateUpdated":"2025-05-22T12:42:13.893Z"},"references":[{"tags":["vendor-advisory"],"url":"https://honeywell.com/us/en/product-security#security-notices"},{"tags":["vendor-advisory"],"url":"https://docs.niagara-community.com/category/tech_bull"}],"source":{"discovery":"UNKNOWN"},"title":"Use of GET Request Method With sensitive Query Strings","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-22T13:19:00.551594Z","id":"CVE-2025-3943","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-22T13:19:08.477Z"}}]}}