An ActiveX control in HscRemoteDeploy.dll in Honeywell Enterprise Buildings Integrator (EBI) R310, R400.2, R410.1, and R410.2; SymmetrE R310, R410.1, and R410.2; ComfortPoint Open Manager (aka CPO-M) Station R100; and HMIWeb Browser client packages allows remote attackers to execute arbitrary code via a crafted HTML document.
References
Link | Resource |
---|---|
http://ics-cert.us-cert.gov/pdf/ICSA-13-053-02.pdf | US Government Resource |
http://ics-cert.us-cert.gov/pdf/ICSA-13-053-02.pdf | US Government Resource |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://ics-cert.us-cert.gov/pdf/ICSA-13-053-02.pdf - US Government Resource |
Information
Published : 2013-02-24 11:48
Updated : 2024-11-21 01:46
NVD link : CVE-2013-0108
Mitre link : CVE-2013-0108
CVE.ORG link : CVE-2013-0108
JSON object : View
Products Affected
honeywell
- enterprise_buildings_integrator
- comfortpoint_open_manager_station
- symmetre
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')