Lucene search

K
nessusThis script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_GENERIC_CVE-2019-13528.NASL
HistoryMar 21, 2023 - 12:00 a.m.

Tridium Niagara Improper Authorization (CVE-2019-13528)

2023-03-2100:00:00
This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
23
tridium
niagara
improper authorization
vulnerability
gain access
privileged files
cve-2019-13528
ot asset

5.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.6%

A specific utility may allow an attacker to gain read access to privileged files in the Niagara AX 3.8u4 (JACE 3e, JACE 6e, JACE 7, JACE-8000), Niagara 4.4u3 (JACE 3e, JACE 6e, JACE 7, JACE-8000), and Niagara 4.7u1 (JACE-8000, Edge 10).

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(500888);
  script_version("1.8");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/04");

  script_cve_id("CVE-2019-13528");

  script_name(english:"Tridium Niagara Improper Authorization (CVE-2019-13528)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"A specific utility may allow an attacker to gain read access to
privileged files in the Niagara AX 3.8u4 (JACE 3e, JACE 6e, JACE 7,
JACE-8000), Niagara 4.4u3 (JACE 3e, JACE 6e, JACE 7, JACE-8000), and
Niagara 4.7u1 (JACE-8000, Edge 10).

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
  script_set_attribute(attribute:"see_also", value:"https://www.us-cert.gov/ics/advisories/icsa-19-262-01");
  script_set_attribute(attribute:"solution", value:
"The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original
can be found at CISA.gov.

Tridium has released updates that mitigate these vulnerabilities and recommends users update to the versions identified
below:

- Niagara AX 3.8u4: 
    - OS Dist: 2.7.402.2
    - NRE Config Dist: 3.8.401.1
- Niagara 4.4u3: 
    - OS Dist: 4.4.73.38.1 NRE Config
    - Dist: 4.4.94.14.1
- Niagara 4.7u1: 
    - OS Dist: (JACE 8000) 4.7.109.16.1
    - OS Dist (Edge 10): 4.7.109.18.1
    - NRE Config Dist: 4.7.110.32.1

Updates are available by contacting the sales support channel or by contacting the Tridium support team at
[email protected]

All Tridium Niagara users for all supported platforms are encouraged to update their systems with these releases to
mitigate risk. For further guidance, please contact a Tridium account manager or Customer Support.

In addition to updating to the latest version, Tridium recommends users with affected products take the following steps:

- Review and validate the list of authorized users who can authenticate to Niagara.
- Allow only trained and trusted persons to have physical access to the system, including devices with connection to the
system though the Ethernet port.
- If remote connections to the network are required, consider using a VPN or other means to ensure secure remote
connections into the network.

For more information please refer to:

- Security Bulletin# SB 2019-Tridium-3
- BlackBerryรขย€ย™s Security Advisory QNX-2019-001");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-13528");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/09/24");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/09/24");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/03/21");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:tridium:niagara4:4.4u3");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:tridium:niagara4:4.7u1");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:tridium:niagara_ax:3.8u4");
  script_set_attribute(attribute:"generated_plugin", value:"former");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/assetBag");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/assetBag');

var asset = tenable_ot::assets::get(hasAssetBag:TRUE);

var vuln_cpes = {
    "cpe:/a:tridium:niagara_ax:3.8u4" :
        {"versionEndIncluding" : "3.8u4", "versionStartIncluding" : "3.8u4", "family" : "Niagara"},
    "cpe:/a:tridium:niagara4:4.4u3" :
        {"versionEndIncluding" : "4.4u3", "versionStartIncluding" : "4.4u3", "family" : "Niagara"},
    "cpe:/a:tridium:niagara4:4.7u1" :
        {"versionEndIncluding" : "4.7u1", "versionStartIncluding" : "4.7u1", "family" : "Niagara"}
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_NOTE);
VendorProductVersionCPE
tridiumniagara44.4u3cpe:/a:tridium:niagara4:4.4u3
tridiumniagara44.7u1cpe:/a:tridium:niagara4:4.7u1
tridiumniagara_ax3.8u4cpe:/a:tridium:niagara_ax:3.8u4

5.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.6%

Related for TENABLE_OT_GENERIC_CVE-2019-13528.NASL