CVE-2022-30244

Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be store on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:honeywell:alerton_ascent_control_module_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:honeywell:alerton_ascent_control_module:-:*:*:*:*:*:*:*

Information

Published : 2022-07-15 05:15

Updated : 2022-07-22 10:05


NVD link : CVE-2022-30244

Mitre link : CVE-2022-30244


JSON object : View

CWE
CWE-829

Inclusion of Functionality from Untrusted Control Sphere

Advertisement

dedicated server usa

Products Affected

honeywell

  • alerton_ascent_control_module
  • alerton_ascent_control_module_firmware