First published: Wed Jan 31 2024(Updated: )
An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.
Credit: psirt@honeywell.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Honeywell ControlEdge Unit Operations Controller | ||
Honeywell ControlEdge | ||
All of | ||
Honeywell ControlEdge Unit Operations Controller | ||
Honeywell Controledge Virtual Unit Operations Controller Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5390 is classified as a moderate severity vulnerability.
To address CVE-2023-5390, update the firmware of the Honeywell Controledge Unit Operations Controller and Virtual Unit Operations Controller to the latest version.
Exploiting CVE-2023-5390 could allow an attacker to read limited files from the Honeywell controllers, potentially exposing sensitive information.
CVE-2023-5390 affects users of the Honeywell Controledge Unit Operations Controller and Controledge Virtual Unit Operations Controller firmware.
There are no known workarounds for CVE-2023-5390; the recommended action is to apply the firmware updates.