CVE-2023-5389

An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. 
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:honeywell:controledge_unit_operations_controller_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:controledge_unit_operations_controller:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:honeywell:controledge_virtual_unit_operations_controller_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:controledge_virtual_unit_operations_controller:-:*:*:*:*:*:*:*

History

08 Feb 2024, 15:20

Type Values Removed Values Added
CWE NVD-CWE-Other
First Time Honeywell controledge Virtual Unit Operations Controller
Honeywell
Honeywell controledge Unit Operations Controller Firmware
Honeywell controledge Virtual Unit Operations Controller Firmware
Honeywell controledge Unit Operations Controller
CVSS v2 : unknown
v3 : 9.1
v2 : unknown
v3 : 7.5
CPE cpe:2.3:o:honeywell:controledge_virtual_unit_operations_controller_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:controledge_virtual_unit_operations_controller:-:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:controledge_unit_operations_controller:-:*:*:*:*:*:*:*
cpe:2.3:o:honeywell:controledge_unit_operations_controller_firmware:-:*:*:*:*:*:*:*
References () https://process.honeywell.com - () https://process.honeywell.com - Product
References () https://www.honeywell.com/us/en/product-security - () https://www.honeywell.com/us/en/product-security - Not Applicable

31 Jan 2024, 18:15

Type Values Removed Values Added
Summary
  • (es) Un atacante podría explotar esta vulnerabilidad, lo que permitiría modificar archivos en Honeywell Experion VirtualUOC y UOC. Esta explotación podría usarse para escribir un archivo que puede resultar en un comportamiento inesperado basado en cambios de configuración o actualización de archivos que podrían resultar en la ejecución posterior de una aplicación maliciosa si se activa. Honeywell recomienda actualizar a la versión más reciente del producto. Consulte la Notificación de seguridad de Honeywell para obtener recomendaciones sobre actualización y control de versiones.
Summary (en) An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion VirtualUOC and UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.  (en) An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. 

30 Jan 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-30 20:15

Updated : 2024-02-08 15:20


NVD link : CVE-2023-5389

Mitre link : CVE-2023-5389

CVE.ORG link : CVE-2023-5389


JSON object : View

Products Affected

honeywell

  • controledge_unit_operations_controller
  • controledge_virtual_unit_operations_controller
  • controledge_unit_operations_controller_firmware
  • controledge_virtual_unit_operations_controller_firmware
CWE
NVD-CWE-Other CWE-749

Exposed Dangerous Method or Function