CVE-2021-39364

Honeywell HDZP252DI 1.00.HW02.4 and HBW2PER1 1.000.HW01.3 devices allow command spoofing (for camera control) after ARP cache poisoning has been achieved.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:honeywell:hdzp252di_firmware:1.00.hw02.4:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:hdzp252di:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:honeywell:hbw2per1_firmware:1.000.hw01.3:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:hbw2per1:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:19

Type Values Removed Values Added
References () https://buildings.honeywell.com/content/dam/hbtbt/en/documents/downloads/Security_Notification_SN_2022-01-26-02_CVE-2021-39364_Video_Replay_HBW2PER1.pdf - Vendor Advisory () https://buildings.honeywell.com/content/dam/hbtbt/en/documents/downloads/Security_Notification_SN_2022-01-26-02_CVE-2021-39364_Video_Replay_HBW2PER1.pdf - Vendor Advisory
References () https://buildings.honeywell.com/us/en/brands/our-brands/security/support-and-resources/product-resources/eol-and-security-notices - Vendor Advisory () https://buildings.honeywell.com/us/en/brands/our-brands/security/support-and-resources/product-resources/eol-and-security-notices - Vendor Advisory
References () https://www.honeywell.com/us/en/product-security - Vendor Advisory () https://www.honeywell.com/us/en/product-security - Vendor Advisory

09 Mar 2022, 15:07

Type Values Removed Values Added
References (CONFIRM) https://buildings.honeywell.com/content/dam/hbtbt/en/documents/downloads/Security_Notification_SN_2022-01-26-02_CVE-2021-39364_Video_Replay_HBW2PER1.pdf - (CONFIRM) https://buildings.honeywell.com/content/dam/hbtbt/en/documents/downloads/Security_Notification_SN_2022-01-26-02_CVE-2021-39364_Video_Replay_HBW2PER1.pdf - Vendor Advisory
References (MISC) https://buildings.honeywell.com/us/en/brands/our-brands/security/support-and-resources/product-resources/eol-and-security-notices - (MISC) https://buildings.honeywell.com/us/en/brands/our-brands/security/support-and-resources/product-resources/eol-and-security-notices - Vendor Advisory
References (MISC) https://www.honeywell.com/us/en/product-security - (MISC) https://www.honeywell.com/us/en/product-security - Vendor Advisory
CWE CWE-294
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CPE cpe:2.3:o:honeywell:hdzp252di_firmware:1.00.hw02.4:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:hdzp252di:-:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:hbw2per1:-:*:*:*:*:*:*:*
cpe:2.3:o:honeywell:hbw2per1_firmware:1.000.hw01.3:*:*:*:*:*:*:*

24 Feb 2022, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-24 22:15

Updated : 2024-11-21 06:19


NVD link : CVE-2021-39364

Mitre link : CVE-2021-39364

CVE.ORG link : CVE-2021-39364


JSON object : View

Products Affected

honeywell

  • hbw2per1_firmware
  • hdzp252di_firmware
  • hdzp252di
  • hbw2per1
CWE
CWE-294

Authentication Bypass by Capture-replay