Lucene search

K
nvd[email protected]NVD:CVE-2023-5389
HistoryJan 30, 2024 - 8:15 p.m.

CVE-2023-5389

2024-01-3020:15:45
CWE-749
web.nvd.nist.gov
exploit
modify files
unexpected behavior
configuration changes
malicious application
update

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

9.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

33.3%

An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.

Affected configurations

NVD
Node
honeywellcontroledge_unit_operations_controller_firmwareMatch-
AND
honeywellcontroledge_unit_operations_controllerMatch-
Node
honeywellcontroledge_virtual_unit_operations_controller_firmwareMatch-
AND
honeywellcontroledge_virtual_unit_operations_controllerMatch-

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

9.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

33.3%

Related for NVD:CVE-2023-5389