CVE-2023-6179: Incorrect Permission assignment to program executable folders
First published: Fri Nov 17 2023(Updated: )
Honeywell ProWatch, 4.5, including all Service Pack versions, contain a Vulnerability in Application Server's executable folder(s). A(n) attacker could potentially exploit this vulnerability, leading to a standard user to have arbitrary system code execution. Honeywell recommends updating to the most recent version of this product, service or offering (Pro-watch 6.0.2, 6.0, 5.5.2,5.0.5).
|Affected Software||Affected Version||How to fix|
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is CVE-2023-6179?
CVE-2023-6179 is a vulnerability in Honeywell ProWatch 4.5 that allows an attacker to execute arbitrary system code.
How are Honeywell ProWatch 4.5 systems affected by CVE-2023-6179?
Honeywell ProWatch 4.5 systems are affected by CVE-2023-6179, allowing arbitrary system code execution.
What is the severity of CVE-2023-6179?
The severity of CVE-2023-6179 is high with a severity score of 7.8.
How can I fix the CVE-2023-6179 vulnerability?
To fix the CVE-2023-6179 vulnerability, it is recommended to update Honeywell ProWatch to the latest version.
Where can I find more information about CVE-2023-6179?
You can find more information about CVE-2023-6179 on the Honeywell website or on the official product security page.
SecAlerts Pty Ltd.
132 Wickham Terrace
QLD 4006, Australiainfo@secalerts.co
© 2023 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203