First published: Thu Jul 13 2023(Updated: )
Experion server may experience a DoS due to a heap overflow which could occur when handling a specially crafted message
Credit: psirt@honeywell.com psirt@honeywell.com
Affected Software | Affected Version | How to fix |
---|---|---|
Honeywell Experion Server | >=501.1<=501.6hf8 | |
Honeywell Experion Server | >=510.1<=510.2hf12 | |
Honeywell Experion Server | >=511.1<=511.5tcu3 | |
Honeywell Experion Server | >=520.1<=520.1tcu4 | |
Honeywell Experion Server | >=520.2<=520.2tcu2 | |
Honeywell Experion Station | >=501.1<=501.6hf8 | |
Honeywell Experion Station | >=510.1<=510.2hf12 | |
Honeywell Experion Station | >=511.1<=511.5tcu3 | |
Honeywell Experion Station | >=520.1<=520.1tcu4 | |
Honeywell Experion Station | >=520.2<=520.2tcu2 | |
Honeywell Engineering Station | >=510.1<=511.5tcu3 | |
Honeywell Engineering Station | >=520.1<=520.1tcu4 | |
Honeywell Engineering Station | >=520.2<=520.2tcu2 | |
Honeywell Direct Station | >=510.1<=511.5tcu3 | |
Honeywell Direct Station | >=520.1<=520.1tcu4 | |
Honeywell Direct Station | >=520.2<=520.2tcu2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-24474.
The title of this vulnerability is 'Experion server may experience a DoS due to a heap overflow which could occur when handling a specially crafted message'.
The Honeywell Experion Server, Experion Station, Engineering Station, and Direct Station are affected by this vulnerability.
This vulnerability has a severity rating of 7.5 (high).
To fix this vulnerability, it is recommended to install the latest security patch provided by Honeywell.