CVE-2022-30244

Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be store on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:honeywell:alerton_ascent_control_module_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:alerton_ascent_control_module:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-07-15 12:15

Updated : 2024-02-28 19:29


NVD link : CVE-2022-30244

Mitre link : CVE-2022-30244

CVE.ORG link : CVE-2022-30244


JSON object : View

Products Affected

honeywell

  • alerton_ascent_control_module_firmware
  • alerton_ascent_control_module
CWE
CWE-829

Inclusion of Functionality from Untrusted Control Sphere