{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T03:53:03.564","vulnerabilities":[{"cve":{"id":"CVE-2025-3940","sourceIdentifier":"psirt@honeywell.com","published":"2025-05-22T13:15:56.870","lastModified":"2025-06-04T19:28:55.960","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Use of Validation Framework vulnerability in Tridium Niagara Framework on Windows, Linux, QNX, Tridium Niagara Enterprise Security on Windows, Linux, QNX allows Input Data Manipulation. This issue affects Niagara Framework: before 4.14.2, before 4.15.1, before 4.10.11; Niagara Enterprise Security: before 4.14.2, before 4.15.1, before 4.10.11. Tridium recommends upgrading to Niagara Framework and Enterprise Security versions 4.14.2u2, 4.15.u1, or 4.10u.11."},{"lang":"es","value":"Vulnerabilidad por uso indebido del marco de validación en Tridium Niagara Framework (Windows, Linux, QNX) y Tridium Niagara Enterprise Security (Windows, Linux y QNX) permite la manipulación de datos de entrada. Este problema afecta a Niagara Framework: versiones anteriores a la 4.14.2, 4.15.1 y 4.10.11; y a Niagara Enterprise Security: versiones anteriores a la 4.14.2, 4.15.1 y 4.10.11. Tridium recomienda actualizar a las versiones 4.14.2u2, 4.15.u1 o 4.10u.11 de Niagara Framework y Enterprise Security."}],"metrics":{"cvssMetricV31":[{"source":"psirt@honeywell.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@honeywell.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1173"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tridium:niagara:4.10u10:*:*:*:*:*:*:*","matchCriteriaId":"0615B9FA-E837-4C21-8968-F3273718DF7D"},{"vulnerable":true,"criteria":"cpe:2.3:a:tridium:niagara:4.14u1:*:*:*:*:*:*:*","matchCriteriaId":"BEE26A6F-876E-450D-8A5F-EF4A3EF96A13"},{"vulnerable":true,"criteria":"cpe:2.3:a:tridium:niagara:4.15:*:*:*:*:*:*:*","matchCriteriaId":"00C6667A-9873-4A75-AB11-3427AA1E552D"},{"vulnerable":true,"criteria":"cpe:2.3:a:tridium:niagara_enterprise_security:4.10u10:*:*:*:*:*:*:*","matchCriteriaId":"E694C4DB-66F7-4753-81D8-9085B5E3A207"},{"vulnerable":true,"criteria":"cpe:2.3:a:tridium:niagara_enterprise_security:4.14u1:*:*:*:*:*:*:*","matchCriteriaId":"506E75F5-D259-4BAC-9C1A-83C9AD54D608"},{"vulnerable":true,"criteria":"cpe:2.3:a:tridium:niagara_enterprise_security:4.15:*:*:*:*:*:*:*","matchCriteriaId":"6DF70636-5B89-4646-80F3-83C906B0EB3C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:blackberry:qnx:-:*:*:*:*:*:*:*","matchCriteriaId":"3642981A-848E-4DEA-A904-A83B9ED4891D"},{"vulnerable":false,"criteria":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","matchCriteriaId":"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}],"references":[{"url":"https://docs.niagara-community.com/category/tech_bull","source":"psirt@honeywell.com","tags":["Permissions Required"]},{"url":"https://honeywell.com/us/en/product-security#security-notices","source":"psirt@honeywell.com","tags":["Vendor Advisory"]}]}}]}