CVE-2022-30244

Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be store on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:honeywell:alerton_ascent_control_module_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:alerton_ascent_control_module:-:*:*:*:*:*:*:*

History

22 Jul 2022, 17:05

Type Values Removed Values Added
CPE cpe:2.3:h:honeywell:alerton_ascent_control_module:-:*:*:*:*:*:*:*
cpe:2.3:o:honeywell:alerton_ascent_control_module_firmware:*:*:*:*:*:*:*:*
First Time Honeywell alerton Ascent Control Module Firmware
Honeywell alerton Ascent Control Module
Honeywell
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.0
CWE CWE-829
References (MISC) https://www.honeywell.com/us/en/product-security - (MISC) https://www.honeywell.com/us/en/product-security - Vendor Advisory
References (MISC) https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities - (MISC) https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities - Third Party Advisory
References (MISC) https://blog.scadafence.com - (MISC) https://blog.scadafence.com - Not Applicable

15 Jul 2022, 12:17

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-15 12:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-30244

Mitre link : CVE-2022-30244

CVE.ORG link : CVE-2022-30244


JSON object : View

Products Affected

honeywell

  • alerton_ascent_control_module_firmware
  • alerton_ascent_control_module
CWE
CWE-829

Inclusion of Functionality from Untrusted Control Sphere