CVE-2023-6179

Honeywell ProWatch, 4.5, including all Service Pack versions, contain a Vulnerability in Application Server's executable folder(s). A(n) attacker could potentially exploit this vulnerability, leading to a standard user to have arbitrary system code execution. Honeywell recommends updating to the most recent version of this product, service or offering (Pro-watch 6.0.2, 6.0, 5.5.2,5.0.5).
Configurations

Configuration 1 (hide)

cpe:2.3:a:honeywell:prowatch:4.5:*:*:*:*:*:*:*

History

25 Nov 2023, 02:13

Type Values Removed Values Added
CWE CWE-732
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:a:honeywell:prowatch:4.5:*:*:*:*:*:*:*
References () https://www.honeywell.com/us/en/product-security - () https://www.honeywell.com/us/en/product-security - Not Applicable
References () https://buildings.honeywell.com/us/en/brands/our-brands/security/support-and-resources/product-resources/eol-and-security-notices - () https://buildings.honeywell.com/us/en/brands/our-brands/security/support-and-resources/product-resources/eol-and-security-notices - Product
First Time Honeywell prowatch
Honeywell

17 Nov 2023, 17:28

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-17 17:15

Updated : 2023-12-10 15:26


NVD link : CVE-2023-6179

Mitre link : CVE-2023-6179

CVE.ORG link : CVE-2023-6179


JSON object : View

Products Affected

honeywell

  • prowatch
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource