Advisory

Multiple vulnerabilities reported in Tridium Niagara Framework

Take action: If you use Tridium Niagara Framework systems (common in HVAC, lighting, and building automation), check to confirm that the system is isolated from the internet and accessible only from trusted networks. Then plan an update to the latest patched versions. Also check for proper encrypted communication between Tridium Niagara and all other components to prevent interception of sensitive data.


Learn More

Researchers at Nozomi Networks Labs are reporting multiple security vulnerabilities in Tridium's widely-deployed Niagara Framework that could allow attackers to achieve complete system compromise when chained together. 

The Tridium Niagara Framework, developed by Tridium (a Honeywell company), serves as a middleware platform connecting IoT devices including HVAC systems, lighting controls, energy management, and security systems. 

Vulnerabilities summary:

  • CVE-2025-3937 (CVSS score varies from 7.7 to 9.8) - Use of Password Hash with Insufficient Computational Effort
  • CVE-2025-3944 (CVSS score varies from 7.2 to 9.8)  - Incorrect Permission Assignment for Critical Resource
  • CVE-2025-3945  (CVSS score varies from 7.2 to 9.8) - Improper Neutralization of Argument Delimiters in a Command
  • CVE-2025-3938 (CVSS score varies from 6.8 to 9.8) - Missing Cryptographic Step
  • CVE-2025-3936 (CVSS score varies from 6.5 to 9.8) - Incorrect Permission Assignment for Critical Resource
  • CVE-2025-3941 (CVSS score varies from 5.4 to 9.8) - Improper Handling of Windows DATA Alternate Data Stream
  • CVE-2025-3940 (CVSS score varies from 5.3 to 9.8) - Improper Use of Validation Framework
  • CVE-2025-3942 (CVSS score varies from 4.3 to 7.5) - Improper Output Neutralization for Logs
  • CVE-2025-3943 (CVSS score varies from 4.1 to 7.5) - Use of GET Request Method with Sensitive Query Strings
  • CVE-2025-3939 (CVSS score 5.3) - Observable Response Discrepancy

Researchers demonstrated an attack chain combining CVE-2025-3943 and CVE-2025-3944 that enables adjacent attackers to achieve complete system compromise. The attack begins with intercepting anti-CSRF refresh tokens transmitted through GET requests, which are logged and potentially sent over unencrypted channels via Syslog. Attackers then escalate logging levels, hijack administrator sessions, steal TLS certificates, and exploit CVE-2025-3944 to execute arbitrary code with root privileges.

Tridium issued patches for all identified vulnerabilities. The company strongly urges asset owners and operators to update affected Niagara installations to the latest patched versions, implement network segmentation to limit system exposure and review encryption configurations to ensure all network communications are properly secured. 

Multiple vulnerabilities reported in Tridium Niagara Framework