mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
106 lines
3.6 KiB
JSON
106 lines
3.6 KiB
JSON
{
|
|
"id": "CVE-2022-30244",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2022-07-15T12:15:08.820",
|
|
"lastModified": "2022-07-22T17:05:05.577",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be store on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El m\u00f3dulo de control Alerton Ascent (ACM) de Honeywell versiones hasta 04-05-2022, permite una escritura de programaci\u00f3n no autenticada por parte de usuarios remotos. Esto permite que el c\u00f3digo sea almacenado en el controlador y luego sea ejecutado sin verificaci\u00f3n. Un usuario con intenciones maliciosas puede enviar un paquete dise\u00f1ado para cambiar y/o detener el programa sin el conocimiento de otros usuarios, alterando la funci\u00f3n del controlador. Tras el cambio de programaci\u00f3n, es necesario sobrescribir el programa para que el controlador recupere su funci\u00f3n operativa original"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.0,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.1,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-829"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:honeywell:alerton_ascent_control_module_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2022-05-04",
|
|
"matchCriteriaId": "DCE4D98D-0502-4449-80D1-BEFA48C305E4"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:honeywell:alerton_ascent_control_module:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4BE0362A-EE15-4DCC-B219-73B4E87C3BA6"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://blog.scadafence.com",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Not Applicable"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.honeywell.com/us/en/product-security",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |