First published: Fri Jul 15 2022(Updated: )
Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated configuration changes from remote users. This enables configuration data to be stored on the controller and then implemented. A user with malicious intent can send a crafted packet to change the controller configuration without the knowledge of other users, altering the controller's function capabilities. The changed configuration is not updated in the User Interface, which creates an inconsistency between the configuration display and the actual configuration on the controller. After the configuration change, remediation requires reverting to the correct configuration, requiring either physical or remote access depending on the configuration that was altered.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Honeywell Alerton Ascent Control Module Firmware | <=2022-05-04 | |
Honeywell Alerton Ascent Control Module |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-30242.
The severity of CVE-2022-30242 is medium (6.8).
Honeywell Alerton Ascent Control Module Firmware versions up to and including 2022-05-04 are affected.
An attacker can exploit CVE-2022-30242 by sending a crafted packet to the controller to change its configuration.
No, authentication is not required to exploit CVE-2022-30242.