First published: Fri Jul 15 2022(Updated: )
Honeywell Alerton Visual Logic through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be stored on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Honeywell Alterton Visual Logic Firmware | <=2022-05-04 | |
Honeywell Alterton Visual Logic |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30243 is a vulnerability in Honeywell Alerton Visual Logic firmware that allows unauthenticated programming writes from remote users.
The severity of CVE-2022-30243 is high with a CVSS score of 8.8.
CVE-2022-30243 allows remote attackers to send crafted packets, enabling them to change and/or stop the program without authentication.
Currently, there is no known fix for CVE-2022-30243. It is recommended to follow the mitigation steps provided by the vendor and consider implementing network segmentation and access controls to limit remote access to affected systems.
Yes, you can find more information about CVE-2022-30243 on the following references: [https://blog.scadafence.com](https://blog.scadafence.com), [https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities](https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities), [https://www.honeywell.com/us/en/product-security](https://www.honeywell.com/us/en/product-security).