CWE
798
Advisory Published
Updated

CVE-2022-30318

First published: Wed Aug 31 2022(Updated: )

Honeywell ControlEdge through R151.1 uses Hard-coded Credentials. According to FSCT-2022-0056, there is a Honeywell ControlEdge hardcoded credentials issue. The affected components are characterized as: SSH. The potential impact is: Remote code execution, manipulate configuration, denial of service. The Honeywell ControlEdge PLC and RTU product line exposes an SSH service on port 22/TCP. Login as root to this service is permitted and credentials for the root user are hardcoded without automatically changing them upon first commissioning. The credentials for the SSH service are hardcoded in the firmware. The credentials grant an attacker access to a root shell on the PLC/RTU, allowing for remote code execution, configuration manipulation and denial of service.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Honeywell Controledge Plc Firmware<r151.2
Honeywell ControlEdge PLC
Honeywell Controledge Rtu Firmware<r151.2
Honeywell Controledge Rtu
Honeywell ControlEdge<151.2
151.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2022-30318?

    CVE-2022-30318 is a vulnerability in Honeywell ControlEdge through R151.1 that uses hard-coded credentials, potentially allowing remote code execution, configuration manipulation, and denial of service.

  • What is the severity of CVE-2022-30318?

    CVE-2022-30318 has a severity rating of 9.8 out of 10, indicating it is critical.

  • Which components are affected by CVE-2022-30318?

    The affected components of CVE-2022-30318 are SSH in Honeywell Controledge PLC Firmware and Honeywell Controledge RTU Firmware up to exclusive version R151.2.

  • How can CVE-2022-30318 be exploited?

    CVE-2022-30318 can be exploited remotely to execute arbitrary code, manipulate configuration settings, and cause denial of service.

  • Is there a fix for CVE-2022-30318?

    To mitigate CVE-2022-30318, it is recommended to update the affected Honeywell ControlEdge components to a version beyond R151.2.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203