TROYANOSYVIRUS
Back to CVEs

CVE-2022-30245

MEDIUM
6.5

Description

Honeywell Alerton Compass Software 1.6.5 allows unauthenticated configuration changes from remote users. This enables configuration data to be stored on the controller and then implemented. A user with malicious intent can send a crafted packet to change the controller configuration without the knowledge of other users, altering the controller's function capabilities. The changed configuration is not updated in the User Interface, which creates an inconsistency between the configuration display and the actual configuration on the controller. After the configuration change, remediation requires reverting to the correct configuration, requiring either physical or remote access depending on the configuration that was altered.

CVE Details

CVSS v3.1 Score6.5
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published7/15/2022
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

honeywell:alerton_compass

Weaknesses (CWE)

CWE-610

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.