CVE-2022-30244

Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be store on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:honeywell:alerton_ascent_control_module_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:alerton_ascent_control_module:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:02

Type Values Removed Values Added
References () https://blog.scadafence.com - Not Applicable () https://blog.scadafence.com - Not Applicable
References () https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities - Third Party Advisory () https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities - Third Party Advisory
References () https://www.honeywell.com/us/en/product-security - Vendor Advisory () https://www.honeywell.com/us/en/product-security - Vendor Advisory

Information

Published : 2022-07-15 12:15

Updated : 2024-11-21 07:02


NVD link : CVE-2022-30244

Mitre link : CVE-2022-30244

CVE.ORG link : CVE-2022-30244


JSON object : View

Products Affected

honeywell

  • alerton_ascent_control_module_firmware
  • alerton_ascent_control_module
CWE
CWE-829

Inclusion of Functionality from Untrusted Control Sphere