First published: Fri May 03 2024(Updated: )
Honeywell Saia PG5 Controls Suite Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ZIP files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. . Was ZDI-CAN-18412.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Honeywell Saia PG5 Controls Suite | ||
Honeywell Saia PG5 Controls Suite | ||
Honeywell Saia PG5 Controls Suite | =2.3.193 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51599 has been assigned a critical severity rating due to the potential for remote code execution.
To fix CVE-2023-51599, users should apply the latest security patches provided by Honeywell for the Saia PG5 Controls Suite.
Exploitation of CVE-2023-51599 could allow remote attackers to execute arbitrary code on the affected systems, compromising the integrity of the controls.
Yes, user interaction is required to successfully exploit CVE-2023-51599.
CVE-2023-51599 specifically affects Honeywell Saia PG5 Controls Suite installations.