Researchers at Nozomi Networks Labs have uncovered 13 critical vulnerabilities affecting Tridium’s Niagara Framework®, a leading software platform that serves as the backbone for building management, industrial automation, and smart infrastructure systems worldwide.
The discovery, announced on July 23, 2025, has prompted immediate action from Tridium to address potential security risks that could compromise critical operational systems across multiple industries.
Framework’s Critical Role in Infrastructure
The Niagara Framework®, developed by Tridium (a Honeywell company), functions as essential middleware that enables diverse systems, including HVAC, lighting, energy management, and security, to communicate seamlessly.
This vendor-neutral platform connects sensors, controllers, and equipment from different manufacturers, translating various communication protocols into a unified data model that powers Internet of Things (IoT) technologies across commercial real estate, healthcare, transportation, manufacturing, and energy sectors.
The framework consists of two primary components: the Platform, which provides core services for creating and supervising Niagara stations, and the Station, which handles device communication and user interfaces.
These components are managed through Niagara Workbench, the integrated development and configuration tool that serves as the primary interface for engineers and system integrators.
Vulnerability Details and Exploitation Risks
The vulnerabilities, affecting Niagara Framework version 4.13 and earlier versions, including 4.10u10 and 4.14u1, become fully exploitable when systems are misconfigured with disabled encryption on specific network devices.
While this misconfiguration triggers security dashboard warnings, it creates opportunities for attackers with network access to compromise entire systems through Man-in-the-Middle (MiTM) attacks.
When chained together, these vulnerabilities could enable malicious actors to achieve lateral movement across organizational networks, using compromised devices as launching points to target other IoT or IT systems.
More concerning, attackers could orchestrate operational disruptions by altering building automation processes, disabling critical systems, or causing broader outages that pose safety risks and financial losses.
Nozomi Networks researchers identified a particularly dangerous attack chain involving two specific vulnerabilities: CVE-2025-3943, which exposes CSRF tokens through insecure GET requests, and CVE-2025-3944, which allows unauthorized file access leading to root-level remote code execution on QNX-based systems.
Industry Response and Mitigation
Tridium responded swiftly to the discovery by issuing a comprehensive security advisory and releasing patches to address all identified vulnerabilities.
The company’s product security team published detailed guidance for affected organizations, emphasizing the critical nature of immediate remediation.
Recommendations for Organizations
Security experts strongly urge asset owners and operators to immediately review Tridium’s security advisory and update affected installations to the latest patched versions.
Additional protective measures include implementing robust network segmentation to limit system exposure and continuously monitoring network traffic for suspicious activity related to Niagara devices.
Given the critical functions controlled by Niagara-powered systems, organizations must prioritize these security updates to protect operational resilience and maintain the integrity of essential infrastructure systems that millions depend upon daily.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates