An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.
References
Link | Resource |
---|---|
https://process.honeywell.com | Product |
https://www.honeywell.com/us/en/product-security | Not Applicable |
https://process.honeywell.com | Product |
https://www.honeywell.com/us/en/product-security | Not Applicable |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 08:41
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
References | () https://process.honeywell.com - Product | |
References | () https://www.honeywell.com/us/en/product-security - Not Applicable |
08 Feb 2024, 15:20
Type | Values Removed | Values Added |
---|---|---|
First Time |
Honeywell controledge Virtual Unit Operations Controller
Honeywell Honeywell controledge Unit Operations Controller Honeywell controledge Unit Operations Controller Firmware Honeywell controledge Virtual Unit Operations Controller Firmware |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:o:honeywell:controledge_virtual_unit_operations_controller_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:honeywell:controledge_unit_operations_controller:-:*:*:*:*:*:*:* cpe:2.3:h:honeywell:controledge_virtual_unit_operations_controller:-:*:*:*:*:*:*:* cpe:2.3:o:honeywell:controledge_unit_operations_controller_firmware:-:*:*:*:*:*:*:* |
|
References | () https://process.honeywell.com - Product | |
References | () https://www.honeywell.com/us/en/product-security - Not Applicable | |
CWE | NVD-CWE-Other |
31 Jan 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary | An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. |
30 Jan 2024, 20:48
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-30 20:15
Updated : 2024-11-21 08:41
NVD link : CVE-2023-5389
Mitre link : CVE-2023-5389
CVE.ORG link : CVE-2023-5389
JSON object : View
Products Affected
honeywell
- controledge_unit_operations_controller_firmware
- controledge_virtual_unit_operations_controller
- controledge_virtual_unit_operations_controller_firmware
- controledge_unit_operations_controller
CWE