CVE-2022-30243

Honeywell Alerton Visual Logic through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be stored on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:honeywell:alterton_visual_logic_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:alterton_visual_logic:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-07-15 12:15

Updated : 2024-02-28 19:29


NVD link : CVE-2022-30243

Mitre link : CVE-2022-30243

CVE.ORG link : CVE-2022-30243


JSON object : View

Products Affected

honeywell

  • alterton_visual_logic
  • alterton_visual_logic_firmware
CWE
CWE-829

Inclusion of Functionality from Untrusted Control Sphere