CVE-2022-30245
https://notcve.org/view.php?id=CVE-2022-30245
Honeywell Alerton Compass Software 1.6.5 allows unauthenticated configuration changes from remote users. This enables configuration data to be stored on the controller and then implemented. A user with malicious intent can send a crafted packet to change the controller configuration without the knowledge of other users, altering the controller's function capabilities. The changed configuration is not updated in the User Interface, which creates an inconsistency between the configuration display and the actual configuration on the controller. After the configuration change, remediation requires reverting to the correct configuration, requiring either physical or remote access depending on the configuration that was altered. • https://blog.scadafence.com https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities https://www.honeywell.com/us/en/product-security • CWE-610: Externally Controlled Reference to a Resource in Another Sphere •
CVE-2022-30244
https://notcve.org/view.php?id=CVE-2022-30244
Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be store on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function. El módulo de control Alerton Ascent (ACM) de Honeywell versiones hasta 04-05-2022, permite una escritura de programación no autenticada por parte de usuarios remotos. • https://blog.scadafence.com https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities https://www.honeywell.com/us/en/product-security • CWE-829: Inclusion of Functionality from Untrusted Control Sphere •
CVE-2022-30243
https://notcve.org/view.php?id=CVE-2022-30243
Honeywell Alerton Visual Logic through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be stored on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function. Honeywell Alerton Visual Logic versiones hasta 04-05-2022, permite una escritura de programación no autenticada de usuarios remotos. • https://blog.scadafence.com https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities https://www.honeywell.com/us/en/product-security • CWE-829: Inclusion of Functionality from Untrusted Control Sphere •
CVE-2022-30242
https://notcve.org/view.php?id=CVE-2022-30242
Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated configuration changes from remote users. This enables configuration data to be stored on the controller and then implemented. A user with malicious intent can send a crafted packet to change the controller configuration without the knowledge of other users, altering the controller's function capabilities. The changed configuration is not updated in the User Interface, which creates an inconsistency between the configuration display and the actual configuration on the controller. After the configuration change, remediation requires reverting to the correct configuration, requiring either physical or remote access depending on the configuration that was altered. • https://blog.scadafence.com https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities https://www.honeywell.com/us/en/product-security •
CVE-2022-1261 – Matrikon OPC Server Improper Access Control
https://notcve.org/view.php?id=CVE-2022-1261
Matrikon, a subsidary of Honeywell Matrikon OPC Server (all versions) is vulnerable to a condition where a low privileged user allowed to connect to the OPC server to use the functions of the IPersisFile to execute operating system processes with system-level privileges. Matrikon, una filial de Honeywell Matrikon OPC Server (todas las versiones) es vulnerable a una condición en la que un usuario poco privilegiado puede conectarse al servidor OPC para usar las funciones del IPersisFile para ejecutar procesos del sistema operativo con privilegios a nivel system • https://www.cisa.gov/uscert/ics/advisories/icsa-22-144-02 • CWE-284: Improper Access Control •