CVE-2023-23585 – Server DoS due to heap overflow
https://notcve.org/view.php?id=CVE-2023-23585
Experion server DoS due to heap overflow occurring during the handling of a specially crafted message for a specific configuration operation. See Honeywell Security Notification for recommendations on upgrading and versioning. • https://process.honeywell.com • CWE-787: Out-of-bounds Write •
CVE-2023-22435 – Server bad parsing implementation - stack overflow in server::get_db_path_for_driver
https://notcve.org/view.php?id=CVE-2023-22435
Experion server may experience a DoS due to a stack overflow when handling a specially crafted message. • https://process.honeywell.com • CWE-697: Incorrect Comparison CWE-787: Out-of-bounds Write •
CVE-2023-3243
https://notcve.org/view.php?id=CVE-2023-3243
[An attacker can capture an authenticating hash and utilize it to create new sessions. The hash is also a poorly salted MD5 hash, which could result in a successful brute force password attack. Impacted product is BCM-WEB version 3.3.X. Recommended fix: Upgrade to a supported product such as Alerton ACM.] Out of an abundance of caution, this CVE ID is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded. • https://www.honeywell.com/us/en/product-security • CWE-290: Authentication Bypass by Spoofing CWE-326: Inadequate Encryption Strength •
CVE-2022-46361 – Physical access to the WDM enables use of USB device to gain access to the WDM
https://notcve.org/view.php?id=CVE-2022-46361
An attacker having physical access to WDM can plug USB device to gain access and execute unwanted commands. A malicious user could enter a system command along with a backup configuration, which could result in the execution of unwanted commands. This issue affects OneWireless all versions up to 322.1 and fixed in version 322.2. • https://process.honeywell.com • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2022-43485 – Insecure random number used for generating keys for signing Jwt tokens
https://notcve.org/view.php?id=CVE-2022-43485
Use of Insufficiently Random Values in Honeywell OneWireless. This vulnerability may allow attacker to manipulate claims in client's JWT token. This issue affects OneWireless version 322.1 • https://process.honeywell.com • CWE-330: Use of Insufficiently Random Values •