Lucene search

K
cvelistHoneywellCVELIST:CVE-2023-6179
HistoryNov 17, 2023 - 5:03 p.m.

CVE-2023-6179 Incorrect Permission assignment to program executable folders

2023-11-1717:03:32
CWE-732
Honeywell
www.cve.org
5
cve-2023-6179
incorrect permission assignment
honeywell prowatch
vulnerability
application server
arbitrary system code execution
update recommendation

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

Honeywell ProWatch, 4.5, including all Service Pack versions, contain a Vulnerability in Application Server’s executable folder(s). A(n) attacker could potentially exploit this vulnerability, leading to a standard user to haveΒ arbitrary system code execution. Honeywell recommends updating to the most recent version of this product, service or offering (Pro-watch 6.0.2, 6.0, 5.5.2,5.0.5).

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "ProWatch",
    "vendor": "Honeywell",
    "versions": [
      {
        "status": "affected",
        "version": "4.5"
      },
      {
        "status": "unaffected",
        "version": "6.0.2"
      },
      {
        "status": "unaffected",
        "version": "6.0"
      },
      {
        "status": "unaffected",
        "version": "5.5.2"
      },
      {
        "status": "unaffected",
        "version": "5.0.5"
      }
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

Related for CVELIST:CVE-2023-6179