Search

published date: May 22, 2025

CVE-2025-3943 : Use of GET Request Method With Sensitive Query Strings Vulnerability

Tridium Niagara

Description

Use of GET Request Method With Sensitive Query Strings vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Parameter Injection. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11.

Product(s):

  • TRIDIUM > niagara 1.*.*
  • TRIDIUM > niagara 3.*.*
  • +28 additional

Question to Ask Vendors:

  1. Have you upgraded all instances of Tridium Niagara to versions 4.14.2, 4.15.1, or 4.10.11 to mitigate the risk of the multiple vulnerabilities including CVE-2025-3936, CVE-2025-3937, CVE-2025-3938, CVE-2025-3939, CVE-2025-3940, CVE-2025-3941, CVE-2025-3942, CVE-2025-3943, CVE-2025-3944, and CVE-2025-3945?
  2. Can you confirm if you have implemented the best practices described in the Niagara Hardening Guide to minimize system attack surface and misconfigurations, specifically in relation to the improper permission assignments and insecure use of cryptographic functions?
  3. Have you enabled logging and alerting for suspicious activity such as unauthorized configuration changes, failed authentication attempts, or unusual input/output patterns to address the logging weaknesses identified in the vulnerabilities?
  4. Can you confirm if you have applied strict input validation and output encoding across the application to prevent injection and log forging attacks, as part of your remediation measures for the flawed validation and input handling mechanisms?

READY TO GET RESULTS YOU CAN TRUST?