CVE-2023-5389

An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. 
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:honeywell:controledge_unit_operations_controller_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:controledge_unit_operations_controller:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:honeywell:controledge_virtual_unit_operations_controller_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:controledge_virtual_unit_operations_controller:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:41

Type Values Removed Values Added
References () https://process.honeywell.com - Product () https://process.honeywell.com - Product
References () https://www.honeywell.com/us/en/product-security - Not Applicable () https://www.honeywell.com/us/en/product-security - Not Applicable
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 9.1

08 Feb 2024, 15:20

Type Values Removed Values Added
References () https://process.honeywell.com - () https://process.honeywell.com - Product
References () https://www.honeywell.com/us/en/product-security - () https://www.honeywell.com/us/en/product-security - Not Applicable
First Time Honeywell controledge Virtual Unit Operations Controller
Honeywell controledge Virtual Unit Operations Controller Firmware
Honeywell
Honeywell controledge Unit Operations Controller
Honeywell controledge Unit Operations Controller Firmware
CVSS v2 : unknown
v3 : 9.1
v2 : unknown
v3 : 7.5
CWE NVD-CWE-Other
CPE cpe:2.3:o:honeywell:controledge_virtual_unit_operations_controller_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:controledge_unit_operations_controller:-:*:*:*:*:*:*:*
cpe:2.3:o:honeywell:controledge_unit_operations_controller_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:controledge_virtual_unit_operations_controller:-:*:*:*:*:*:*:*

31 Jan 2024, 18:15

Type Values Removed Values Added
Summary An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion VirtualUOC and UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.  An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. 

30 Jan 2024, 20:48

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-30 20:15

Updated : 2024-11-21 08:41


NVD link : CVE-2023-5389

Mitre link : CVE-2023-5389

CVE.ORG link : CVE-2023-5389


JSON object : View

Products Affected

honeywell

  • controledge_unit_operations_controller
  • controledge_virtual_unit_operations_controller_firmware
  • controledge_unit_operations_controller_firmware
  • controledge_virtual_unit_operations_controller
CWE
CWE-749

Exposed Dangerous Method or Function

NVD-CWE-Other