First published: Fri Jul 15 2022(Updated: )
Honeywell Alerton Compass Software 1.6.5 allows unauthenticated configuration changes from remote users. This enables configuration data to be stored on the controller and then implemented. A user with malicious intent can send a crafted packet to change the controller configuration without the knowledge of other users, altering the controller's function capabilities. The changed configuration is not updated in the User Interface, which creates an inconsistency between the configuration display and the actual configuration on the controller. After the configuration change, remediation requires reverting to the correct configuration, requiring either physical or remote access depending on the configuration that was altered.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Honeywell Alerton Compass | =1.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Honeywell Alerton Compass Software vulnerability is CVE-2022-30245.
The severity of CVE-2022-30245 is medium with a severity value of 6.5.
CVE-2022-30245 allows unauthenticated configuration changes from remote users in Honeywell Alerton Compass Software.
Honeywell Alerton Compass Software version 1.6.5 is affected by CVE-2022-30245.
To fix the CVE-2022-30245 vulnerability in Honeywell Alerton Compass Software, update to a version that is not affected by the vulnerability.