CVE-2022-30245

Honeywell Alerton Compass Software 1.6.5 allows unauthenticated configuration changes from remote users. This enables configuration data to be stored on the controller and then implemented. A user with malicious intent can send a crafted packet to change the controller configuration without the knowledge of other users, altering the controller's function capabilities. The changed configuration is not updated in the User Interface, which creates an inconsistency between the configuration display and the actual configuration on the controller. After the configuration change, remediation requires reverting to the correct configuration, requiring either physical or remote access depending on the configuration that was altered.
Configurations

Configuration 1 (hide)

cpe:2.3:a:honeywell:alerton_compass:1.6.5:*:*:*:*:*:*:*

History

25 Jul 2022, 17:50

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:a:honeywell:alerton_compass:1.6.5:*:*:*:*:*:*:*
CWE CWE-610
First Time Honeywell alerton Compass
Honeywell
References (MISC) https://www.honeywell.com/us/en/product-security - (MISC) https://www.honeywell.com/us/en/product-security - Vendor Advisory
References (MISC) https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities - (MISC) https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities - Third Party Advisory
References (MISC) https://blog.scadafence.com - (MISC) https://blog.scadafence.com - Third Party Advisory

15 Jul 2022, 12:17

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-15 12:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-30245

Mitre link : CVE-2022-30245

CVE.ORG link : CVE-2022-30245


JSON object : View

Products Affected

honeywell

  • alerton_compass
CWE
CWE-610

Externally Controlled Reference to a Resource in Another Sphere