Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-30244

Опубликовано: 15 июл. 2022
Источник: nvd
CVSS3: 8
EPSS Низкий

Описание

Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be store on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:honeywell:alerton_ascent_control_module_firmware:*:*:*:*:*:*:*:*
Версия до 2022-05-04 (включая)
cpe:2.3:h:honeywell:alerton_ascent_control_module:-:*:*:*:*:*:*:*

EPSS

Процентиль: 58%
0.00365
Низкий

8 High

CVSS3

Дефекты

CWE-829

Связанные уязвимости

CVSS3: 8
github
больше 3 лет назад

Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be store on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function.

EPSS

Процентиль: 58%
0.00365
Низкий

8 High

CVSS3

Дефекты

CWE-829