CVE-2023-5389

An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. 
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:honeywell:controledge_unit_operations_controller_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:controledge_unit_operations_controller:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:honeywell:controledge_virtual_unit_operations_controller_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:controledge_virtual_unit_operations_controller:-:*:*:*:*:*:*:*

History

08 Feb 2024, 15:20

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE NVD-CWE-Other
References () https://www.honeywell.com/us/en/product-security - () https://www.honeywell.com/us/en/product-security - Not Applicable
References () https://process.honeywell.com - () https://process.honeywell.com - Product
CPE cpe:2.3:h:honeywell:controledge_unit_operations_controller:-:*:*:*:*:*:*:*
cpe:2.3:o:honeywell:controledge_virtual_unit_operations_controller_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:controledge_virtual_unit_operations_controller:-:*:*:*:*:*:*:*
cpe:2.3:o:honeywell:controledge_unit_operations_controller_firmware:-:*:*:*:*:*:*:*
First Time Honeywell
Honeywell controledge Unit Operations Controller Firmware
Honeywell controledge Virtual Unit Operations Controller
Honeywell controledge Virtual Unit Operations Controller Firmware
Honeywell controledge Unit Operations Controller

31 Jan 2024, 18:15

Type Values Removed Values Added
Summary An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion VirtualUOC and UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.  An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. 

30 Jan 2024, 20:48

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-30 20:15

Updated : 2024-02-08 15:20


NVD link : CVE-2023-5389

Mitre link : CVE-2023-5389


JSON object : View

Products Affected

honeywell

  • controledge_unit_operations_controller_firmware
  • controledge_virtual_unit_operations_controller
  • controledge_unit_operations_controller
  • controledge_virtual_unit_operations_controller_firmware