Lucene search

K
cveHoneywellCVE-2023-6179
HistoryNov 17, 2023 - 5:15 p.m.

CVE-2023-6179

2023-11-1717:15:08
CWE-732
Honeywell
web.nvd.nist.gov
32
honeywell
prowatch
vulnerability
cve-2023-6179
code execution
update
nvd
security advisory

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0

Percentile

5.1%

Honeywell ProWatch, 4.5, including all Service Pack versions, contain a Vulnerability in Application Server’s executable folder(s). A(n) attacker could potentially exploit this vulnerability, leading to a standard user to haveΒ arbitrary system code execution. Honeywell recommends updating to the most recent version of this product, service or offering (Pro-watch 6.0.2, 6.0, 5.5.2,5.0.5).

Affected configurations

Nvd
Node
honeywellprowatchMatch4.5
VendorProductVersionCPE
honeywellprowatch4.5cpe:2.3:a:honeywell:prowatch:4.5:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "ProWatch",
    "vendor": "Honeywell",
    "versions": [
      {
        "status": "affected",
        "version": "4.5"
      },
      {
        "status": "unaffected",
        "version": "6.0.2"
      },
      {
        "status": "unaffected",
        "version": "6.0"
      },
      {
        "status": "unaffected",
        "version": "5.5.2"
      },
      {
        "status": "unaffected",
        "version": "5.0.5"
      }
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0

Percentile

5.1%

Related for CVE-2023-6179