First published: Fri Jul 15 2022(Updated: )
Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be store on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Honeywell Alerton Ascent Control Module Firmware | <=2022-05-04 | |
Honeywell Alerton Ascent Control Module |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30244 is a vulnerability that allows unauthenticated programming writes from remote users in Honeywell Alerton Ascent Control Module (ACM) firmware before 2022-05-04.
CVE-2022-30244 allows remote users to send crafted packets to change and/or stop the program running on the controller without authentication.
CVE-2022-30244 has a severity level of high with a severity value of 8.
To fix CVE-2022-30244, users should update their Honeywell Alerton Ascent Control Module (ACM) firmware to version 2022-05-04 or later.
More information about CVE-2022-30244 can be found at the following references: [link1], [link2], [link3].