cvelist/2023/5xxx/CVE-2023-5392.json
2024-04-25 17:00:33 +00:00

109 lines
4.0 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-5392",
"ASSIGNER": "psirt@honeywell.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "C300 information leak due to an analysis feature which allows extracting more memory over the network than required by the function.\u00a0Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. \n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-1295",
"cweId": "CWE-1295"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Honeywell",
"product": {
"product_data": [
{
"product_name": "C300",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "520.2",
"version_value": "520.2 TCU4"
},
{
"version_affected": "<=",
"version_name": "510.1",
"version_value": "510.2 HF13"
},
{
"version_affected": "<=",
"version_name": "520.1",
"version_value": "520.1 TCU4"
},
{
"version_affected": "<=",
"version_name": "511.1",
"version_value": "511.5 TCU4 HF3"
},
{
"version_affected": "<=",
"version_name": "520.2 TCU4 HFR2",
"version_value": "511.5 TCU4 HF3"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://process.honeywell.com",
"refsource": "MISC",
"name": "https://process.honeywell.com"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
]
}
}