An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.
References
Link | Resource |
---|---|
https://process.honeywell.com | Product |
https://www.honeywell.com/us/en/product-security | Not Applicable |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
No history.
Information
Published : 2024-01-30 20:15
Updated : 2024-02-08 15:20
NVD link : CVE-2023-5389
Mitre link : CVE-2023-5389
CVE.ORG link : CVE-2023-5389
JSON object : View
Products Affected
honeywell
- controledge_virtual_unit_operations_controller_firmware
- controledge_unit_operations_controller
- controledge_virtual_unit_operations_controller
- controledge_unit_operations_controller_firmware
CWE