Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qj3p-g2m7-rx94

Опубликовано: 31 янв. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.

An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.

EPSS

Процентиль: 36%
0.00155
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-22
CWE-36

Связанные уязвимости

CVSS3: 5.3
nvd
около 2 лет назад

An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.

CVSS3: 5.3
fstec
около 2 лет назад

Уязвимость микропрограммного обеспечения модульных контроллеров Honeywell Experion ControlEdge VirtualUOC и ControlEdge UOC , позволяющая нарушителю раскрыть защищаемую информацию или выполнить запись произвольных файлов

EPSS

Процентиль: 36%
0.00155
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-22
CWE-36