Honeywell Alerton Visual Logic through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be stored on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function.
References
Link | Resource |
---|---|
https://blog.scadafence.com | Not Applicable |
https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities | Third Party Advisory |
https://www.honeywell.com/us/en/product-security | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-07-15T11:40:15
Updated: 2022-07-15T11:40:15
Reserved: 2022-05-04T00:00:00
Link: CVE-2022-30243
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-07-15T12:15:08.777
Modified: 2022-07-22T17:13:25.393
Link: CVE-2022-30243
JSON object: View
Redhat Information
No data.
CWE