First published: Thu Jul 13 2023(Updated: )
Server information leak of configuration data when an error is generated in response to a specially crafted message.
Credit: psirt@honeywell.com psirt@honeywell.com
Affected Software | Affected Version | How to fix |
---|---|---|
Honeywell Experion Server | >=501.1<=501.6hf8 | |
Honeywell Experion Server | >=510.1<=510.2hf12 | |
Honeywell Experion Server | >=511.1<=511.5tcu3 | |
Honeywell Experion Server | >=520.1<=520.1tcu4 | |
Honeywell Experion Server | >=520.2<=520.2tcu2 | |
Honeywell Experion Station | >=501.1<=501.6hf8 | |
Honeywell Experion Station | >=510.1<=510.2hf12 | |
Honeywell Experion Station | >=511.1<=511.5tcu3 | |
Honeywell Experion Station | >=520.1<=520.1tcu4 | |
Honeywell Experion Station | >=520.2<=520.2tcu2 | |
Honeywell Engineering Station | >=510.1<=511.tcu3 | |
Honeywell Engineering Station | >=520.1<=520.1tcu4 | |
Honeywell Engineering Station | >=520.2<=520.2tcu2 | |
Honeywell Direct Station | >=510.1<=511.tcu3 | |
Honeywell Direct Station | >=520.1<=520.1tcu4 | |
Honeywell Direct Station | >=520.2<=520.2tcu2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-25948.
CVE-2023-25948 has a severity level of high.
Honeywell Experion Server, Honeywell Experion Station, Honeywell Engineering Station, and Honeywell Direct Station are affected by CVE-2023-25948.
This vulnerability can be exploited by generating an error with a specially crafted message.
Yes, it is recommended to apply the latest security patches provided by Honeywell to fix CVE-2023-25948.