HIGH · 8.8

CVE-2022-30243

Honeywell Alerton Visual Logic through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be stored on the controller and then run without verification. A use...

Vulnerability Description

Honeywell Alerton Visual Logic through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be stored on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function.

CVSS Score

8.8

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
HoneywellAlterton Visual Logic Firmware<= 2022-05-04
HoneywellAlterton Visual Logic-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-30243?

CVE-2022-30243 is a vulnerability with a CVSS score of 8.8 (HIGH). Honeywell Alerton Visual Logic through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be stored on the controller and then run without verification. A use...

How severe is CVE-2022-30243?

CVE-2022-30243 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-30243?

Check the references section above for vendor advisories and patch information. Affected products include: Honeywell Alterton Visual Logic Firmware, Honeywell Alterton Visual Logic.