If an attacker manages to trick a valid user into loading a malicious DLL, the attacker may be able to achieve code execution in Honeywell SoftMaster version 4.51 application’s context and permissions.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-256-02 | Third Party Advisory US Government Resource |
https://www.security.honeywell.com/-/media/Security/Resources/PDF/Product-Warranty/Security_Notification_SN_2019-09-13-02_V4-pdf.pdf | Not Applicable |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-256-02 | Third Party Advisory US Government Resource |
https://www.security.honeywell.com/-/media/Security/Resources/PDF/Product-Warranty/Security_Notification_SN_2019-09-13-02_V4-pdf.pdf | Not Applicable |
Configurations
History
21 Nov 2024, 07:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-22-256-02 - Third Party Advisory, US Government Resource | |
References | () https://www.security.honeywell.com/-/media/Security/Resources/PDF/Product-Warranty/Security_Notification_SN_2019-09-13-02_V4-pdf.pdf - Not Applicable | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
Information
Published : 2022-09-16 22:15
Updated : 2024-11-21 07:00
NVD link : CVE-2022-2333
Mitre link : CVE-2022-2333
CVE.ORG link : CVE-2022-2333
JSON object : View
Products Affected
honeywell
- softmaster
CWE
CWE-427
Uncontrolled Search Path Element