Lucene search

K
vulnrichmentHoneywellVULNRICHMENT:CVE-2023-5400
HistoryApr 17, 2024 - 4:41 p.m.

CVE-2023-5400

2024-04-1716:41:10
CWE-122
Honeywell
github.com
2
server
heap overflow
malformed message
remote code execution
failure
honeywell security notification
recommendations
upgrading
versioning

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Server receiving a malformed message based on a using the specified key values can cause a heap overflow vulnerability which could lead to an attacker performing remote code execution or causing a failure. 
See Honeywell Security Notification for recommendations on upgrading and versioning.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:honeywell:experion_server:*:*:*:*:*:*:*:*"
    ],
    "vendor": "honeywell",
    "product": "experion_server",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:honeywell:experion_server:*:*:*:*:*:*:*:*"
    ],
    "vendor": "honeywell",
    "product": "experion_server",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:honeywell:experion_server:*:*:*:*:*:*:*:*"
    ],
    "vendor": "honeywell",
    "product": "experion_server",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:honeywell:experion_server:*:*:*:*:*:*:*:*"
    ],
    "vendor": "honeywell",
    "product": "experion_server",
    "versions": [
      {
        "status": "affected",
        "version": "*"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2023-5400