First published: Fri Nov 17 2023(Updated: )
Honeywell ProWatch, 4.5, including all Service Pack versions, contain a Vulnerability in Application Server's executable folder(s). A(n) attacker could potentially exploit this vulnerability, leading to a standard user to have arbitrary system code execution. Honeywell recommends updating to the most recent version of this product, service or offering (Pro-watch 6.0.2, 6.0, 5.5.2,5.0.5).
Credit: psirt@honeywell.com
Affected Software | Affected Version | How to fix |
---|---|---|
Honeywell ProWatch | =4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6179 is a vulnerability in Honeywell ProWatch 4.5 that allows an attacker to execute arbitrary system code.
Honeywell ProWatch 4.5 systems are affected by CVE-2023-6179, allowing arbitrary system code execution.
The severity of CVE-2023-6179 is high with a severity score of 7.8.
To fix the CVE-2023-6179 vulnerability, it is recommended to update Honeywell ProWatch to the latest version.
You can find more information about CVE-2023-6179 on the Honeywell website or on the official product security page.