Show plain JSON{"id": "CVE-2022-30245", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 2.8}]}, "published": "2022-07-15T12:15:08.860", "references": [{"url": "https://blog.scadafence.com", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.honeywell.com/us/en/product-security", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-610"}]}], "descriptions": [{"lang": "en", "value": "Honeywell Alerton Compass Software 1.6.5 allows unauthenticated configuration changes from remote users. This enables configuration data to be stored on the controller and then implemented. A user with malicious intent can send a crafted packet to change the controller configuration without the knowledge of other users, altering the controller's function capabilities. The changed configuration is not updated in the User Interface, which creates an inconsistency between the configuration display and the actual configuration on the controller. After the configuration change, remediation requires reverting to the correct configuration, requiring either physical or remote access depending on the configuration that was altered."}, {"lang": "es", "value": "El software Honeywell Alerton Compass versi\u00f3n 1.6.5, permite realizar cambios de configuraci\u00f3n no autenticados desde usuarios remotos. Esto permite que los datos de configuraci\u00f3n sean almacenados en el controlador y luego sean implementados. Un usuario con intenciones maliciosas puede enviar un paquete dise\u00f1ado para cambiar la configuraci\u00f3n del controlador sin el conocimiento de otros usuarios, alterando las capacidades de funcionamiento del controlador. La configuraci\u00f3n modificada no es actualizada en la interfaz de usuario, lo que crea una incoherencia entre la visualizaci\u00f3n de la configuraci\u00f3n y la configuraci\u00f3n real en el controlador. Tras el cambio de configuraci\u00f3n, la reparaci\u00f3n requiere volver a la configuraci\u00f3n correcta, lo que requiere un acceso f\u00edsico o remoto dependiendo de la configuraci\u00f3n que haya sido alterado"}], "lastModified": "2022-07-25T17:50:26.467", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:honeywell:alerton_compass:1.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B77C89F5-1BB4-43D4-926A-D447ACD8A6A8"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}