CVE-2022-30245
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Honeywell Alerton Compass Software 1.6.5 allows unauthenticated configuration changes from remote users. This enables configuration data to be stored on the controller and then implemented. A user with malicious intent can send a crafted packet to change the controller configuration without the knowledge of other users, altering the controller's function capabilities. The changed configuration is not updated in the User Interface, which creates an inconsistency between the configuration display and the actual configuration on the controller. After the configuration change, remediation requires reverting to the correct configuration, requiring either physical or remote access depending on the configuration that was altered.
El software Honeywell Alerton Compass versión 1.6.5, permite realizar cambios de configuración no autenticados desde usuarios remotos. Esto permite que los datos de configuración sean almacenados en el controlador y luego sean implementados. Un usuario con intenciones maliciosas puede enviar un paquete diseñado para cambiar la configuración del controlador sin el conocimiento de otros usuarios, alterando las capacidades de funcionamiento del controlador. La configuración modificada no es actualizada en la interfaz de usuario, lo que crea una incoherencia entre la visualización de la configuración y la configuración real en el controlador. Tras el cambio de configuración, la reparación requiere volver a la configuración correcta, lo que requiere un acceso físico o remoto dependiendo de la configuración que haya sido alterado
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-05-04 CVE Reserved
- 2022-07-15 CVE Published
- 2024-02-05 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-610: Externally Controlled Reference to a Resource in Another Sphere
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://blog.scadafence.com | Third Party Advisory | |
https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.honeywell.com/us/en/product-security | 2022-07-25 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Honeywell Search vendor "Honeywell" | Alerton Compass Search vendor "Honeywell" for product "Alerton Compass" | 1.6.5 Search vendor "Honeywell" for product "Alerton Compass" and version "1.6.5" | - |
Affected
|