CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
52.3%
Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to relative path traversal, which may allow an attacker access to unauthorized files and directories.
Vendor | Product | Version | CPE |
---|---|---|---|
honeywell | c200_firmware | - | cpe:2.3:o:honeywell:c200_firmware:-:*:*:*:*:*:*:* |
honeywell | c200 | - | cpe:2.3:h:honeywell:c200:-:*:*:*:*:*:*:* |
honeywell | c200e_firmware | - | cpe:2.3:o:honeywell:c200e_firmware:-:*:*:*:*:*:*:* |
honeywell | c200e | - | cpe:2.3:h:honeywell:c200e:-:*:*:*:*:*:*:* |
honeywell | c300 | - | cpe:2.3:h:honeywell:c300:-:*:*:*:*:*:*:* |
honeywell | c300_firmware | - | cpe:2.3:o:honeywell:c300_firmware:-:*:*:*:*:*:*:* |
honeywell | application_control_environment | - | cpe:2.3:h:honeywell:application_control_environment:-:*:*:*:*:*:*:* |
honeywell | application_control_environment_firmware | - | cpe:2.3:o:honeywell:application_control_environment_firmware:-:*:*:*:*:*:*:* |
[
{
"vendor": "Honeywell",
"product": "Experion PKS",
"versions": [
{
"version": "C200",
"status": "affected"
},
{
"version": "C200E",
"status": "affected"
},
{
"version": "C300",
"status": "affected"
},
{
"version": "ACE controllers",
"status": "affected"
}
]
}
]
More