Lucene search

K
vulnrichmentHoneywellVULNRICHMENT:CVE-2023-6179
HistoryNov 17, 2023 - 5:03 p.m.

CVE-2023-6179 Incorrect Permission assignment to program executable folders

2023-11-1717:03:32
CWE-732
Honeywell
github.com
1
honeywell
prowatch
vulnerability
permission assignment
executable folder
code execution
update

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

7.5

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Honeywell ProWatch, 4.5, including all Service Pack versions, contain a Vulnerability in Application Server’s executable folder(s). A(n) attacker could potentially exploit this vulnerability, leading to a standard user to haveΒ arbitrary system code execution. Honeywell recommends updating to the most recent version of this product, service or offering (Pro-watch 6.0.2, 6.0, 5.5.2,5.0.5).

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:honeywell:prowatch:*:*:*:*:*:*:*:*"
    ],
    "vendor": "honeywell",
    "product": "prowatch",
    "versions": [
      {
        "status": "affected",
        "version": "5.0.5"
      },
      {
        "status": "affected",
        "version": "5.5.2"
      },
      {
        "status": "affected",
        "version": "6.0"
      },
      {
        "status": "affected",
        "version": "6.0.2"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

7.5

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2023-6179