Tridium Niagara AX Path Traversal (CVE-2012-4027)

high Tenable OT Security Plugin ID 500894


The remote OT asset is affected by a vulnerability.


Directory traversal vulnerability in Tridium Niagara AX Framework allows remote attackers to read files outside of the intended images, nav, and px folders by leveraging incorrect permissions, as demonstrated by reading the config.bog file.

This plugin only works with Tenable.ot.
Please visit for more information.


Refer to the vendor advisory.

See Also

Plugin Details

Severity: High

ID: 500894

Version: 1.4

Type: remote

Family: Tenable.ot

Published: 3/21/2023

Updated: 10/17/2023

Supported Sensors: Tenable OT Security

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2012-4027


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:tridium:niagara_ax_framework

Required KB Items: Tenable.ot/assetBag

Exploit Ease: No known exploits are available

Patch Publication Date: 7/16/2012

Vulnerability Publication Date: 7/16/2012

Reference Information

CVE: CVE-2012-4027

CWE: 264