mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
128 lines
4.7 KiB
JSON
128 lines
4.7 KiB
JSON
{
|
|
"id": "CVE-2022-30242",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2022-07-15T12:15:08.730",
|
|
"lastModified": "2024-11-21T07:02:26.460",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated configuration changes from remote users. This enables configuration data to be stored on the controller and then implemented. A user with malicious intent can send a crafted packet to change the controller configuration without the knowledge of other users, altering the controller's function capabilities. The changed configuration is not updated in the User Interface, which creates an inconsistency between the configuration display and the actual configuration on the controller. After the configuration change, remediation requires reverting to the correct configuration, requiring either physical or remote access depending on the configuration that was altered."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El m\u00f3dulo de control Alerton Ascent (ACM) de Honeywell versiones hasta 04-05-2022, permite realizar cambios de configuraci\u00f3n no autenticados desde usuarios remotos. Esto permite que los datos de configuraci\u00f3n sean almacenados en el controlador y luego son implementados. Un usuario con intenciones maliciosas puede enviar un paquete dise\u00f1ado para cambiar la configuraci\u00f3n del controlador sin el conocimiento de otros usuarios, alterando las capacidades de funcionamiento del controlador. La configuraci\u00f3n modificada no es actualizada en la interfaz de usuario, lo que crea una incoherencia entre la visualizaci\u00f3n de la configuraci\u00f3n y la configuraci\u00f3n real en el controlador. Despu\u00e9s del cambio de configuraci\u00f3n, la remediaci\u00f3n requiere revertir a la configuraci\u00f3n correcta, requiriendo acceso f\u00edsico o remoto dependiendo de la configuraci\u00f3n que fue alterada"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
|
|
"baseScore": 6.8,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.3,
|
|
"impactScore": 4.0
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:honeywell:alerton_ascent_control_module_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2022-05-04",
|
|
"matchCriteriaId": "DCE4D98D-0502-4449-80D1-BEFA48C305E4"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:honeywell:alerton_ascent_control_module:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4BE0362A-EE15-4DCC-B219-73B4E87C3BA6"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://blog.scadafence.com",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Not Applicable"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.honeywell.com/us/en/product-security",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://blog.scadafence.com",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Not Applicable"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.honeywell.com/us/en/product-security",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |