Page 4 of 25 results (0.010 seconds)

CVSS: 9.8EPSS: 0%CPEs: 16EXPL: 0

Experion server DoS due to heap overflow occurring during the handling of a specially crafted message for a specific configuration operation.  See Honeywell Security Notification for recommendations on upgrading and versioning. • https://process.honeywell.com • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 16EXPL: 0

Experion server may experience a DoS due to a stack overflow when handling a specially crafted message. • https://process.honeywell.com • CWE-697: Incorrect Comparison CWE-787: Out-of-bounds Write •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

Honeywell Experion LX through 2022-05-06 has Missing Authentication for a Critical Function. According to FSCT-2022-0055, there is a Honeywell Experion LX Control Data Access (CDA) EpicMo protocol with unauthenticated functionality issue. The affected components are characterized as: Honeywell Control Data Access (CDA) EpicMo (55565/TCP). The potential impact is: Firmware manipulation, Denial of service. The Honeywell Experion LX Distributed Control System (DCS) utilizes the Control Data Access (CDA) EpicMo protocol (55565/TCP) for device diagnostics and maintenance purposes. • https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-07 https://www.forescout.com/blog • CWE-306: Missing Authentication for Critical Function •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

An arbitrary memory write vulnerability exists in the dual_onsrv.exe module in Honeywell Experion PKS R40x before R400.6, R41x before R410.6, and R43x before R430.2, that could lead to possible remote code execution or denial of service. Honeywell strongly encourages and recommends all customers running unsupported versions of EKPS prior to R400 to upgrade to a supported version. Se presenta una vulnerabilidad de escritura de memoria arbitraria en el módulo dual_onsrv.exe en Honeywell Experion PKS R40x anterior a R400.6, R41x anterior a R410.6 y R43x anterior a R430.2, lo que podría conducir a una posible ejecución de código remota o denegación de servicio. Honeywell exhorta encarecidamente y recomienda a todos los clientes que ejecutan versiones no compatibles de EKPS anterior a R400 para actualizar a una versión compatible. • https://ics-cert.us-cert.gov/advisories/ICSA-14-352-01 • CWE-123: Write-what-where Condition CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

A directory traversal vulnerability exists in the confd.exe module in Honeywell Experion PKS R40x before R400.6, R41x before R410.6, and R43x before R430.2, which could lead to possible information disclosure. Honeywell strongly encourages and recommends all customers running unsupported versions of EKPS prior to R400 to upgrade to a supported version. Se presenta una vulnerabilidad de salto de directorio (directory traversal) en el módulo confd.exe en Honeywell Experion PKS R40x anterior a R400.6, R41x anterior a R410.6 y R43x anterior a R430.2, lo que podría conducir a una posible divulgación de información. Honeywell exhorta encarecidamente y recomienda a todos los clientes que ejecutan versiones no compatibles de EKPS anterior a R400 a actualizar a una versión compatible. • https://ics-cert.us-cert.gov/advisories/ICSA-14-352-01 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •