Honeywell ProWatch, 4.5, including all Service Pack versions, contain a Vulnerability in Application Server's executable folder(s). A(n) attacker could potentially exploit this vulnerability, leading to a standard user to have arbitrary system code execution. Honeywell recommends updating to the most recent version of this product, service or offering (Pro-watch 6.0.2, 6.0, 5.5.2,5.0.5).
References
Configurations
History
25 Nov 2023, 02:13
Type | Values Removed | Values Added |
---|---|---|
First Time |
Honeywell prowatch
Honeywell |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-732 | |
CPE | cpe:2.3:a:honeywell:prowatch:4.5:*:*:*:*:*:*:* | |
References | () https://buildings.honeywell.com/us/en/brands/our-brands/security/support-and-resources/product-resources/eol-and-security-notices - Product | |
References | () https://www.honeywell.com/us/en/product-security - Not Applicable |
17 Nov 2023, 17:28
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-17 17:15
Updated : 2024-02-28 20:54
NVD link : CVE-2023-6179
Mitre link : CVE-2023-6179
CVE.ORG link : CVE-2023-6179
JSON object : View
Products Affected
honeywell
- prowatch
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource