CVE-2023-5389

An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. 
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:honeywell:controledge_unit_operations_controller_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:controledge_unit_operations_controller:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:honeywell:controledge_virtual_unit_operations_controller_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:controledge_virtual_unit_operations_controller:-:*:*:*:*:*:*:*

History

08 Feb 2024, 15:20

Type Values Removed Values Added
First Time Honeywell controledge Virtual Unit Operations Controller
Honeywell
Honeywell controledge Unit Operations Controller
Honeywell controledge Unit Operations Controller Firmware
Honeywell controledge Virtual Unit Operations Controller Firmware
References () https://process.honeywell.com - () https://process.honeywell.com - Product
References () https://www.honeywell.com/us/en/product-security - () https://www.honeywell.com/us/en/product-security - Not Applicable
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:o:honeywell:controledge_virtual_unit_operations_controller_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:controledge_unit_operations_controller:-:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:controledge_virtual_unit_operations_controller:-:*:*:*:*:*:*:*
cpe:2.3:o:honeywell:controledge_unit_operations_controller_firmware:-:*:*:*:*:*:*:*
CWE NVD-CWE-Other

31 Jan 2024, 18:15

Type Values Removed Values Added
Summary An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion VirtualUOC and UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.  An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. 

30 Jan 2024, 20:48

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-30 20:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-5389

Mitre link : CVE-2023-5389

CVE.ORG link : CVE-2023-5389


JSON object : View

Products Affected

honeywell

  • controledge_unit_operations_controller
  • controledge_virtual_unit_operations_controller
  • controledge_virtual_unit_operations_controller_firmware
  • controledge_unit_operations_controller_firmware
CWE
NVD-CWE-Other CWE-749

Exposed Dangerous Method or Function