7.5
CVE-2023-5392
- EPSS 0.11%
- Published 11.04.2024 20:15:09
- Last modified 21.11.2024 08:41:40
- Source psirt@honeywell.com
- Teams watchlist Login
- Open Login
C300 information leak due to an analysis feature which allows extracting more memory over the network than required by the function. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendorhoneywell
≫
Product
c300
Default Statusunaffected
Version <=
510.2_hf13
Version
510.1
Status
affected
Version <=
511.5_tcu4_hf3
Version
511.1
Status
affected
Version <=
520.1_tcu4
Version
520.1
Status
affected
Version <=
520.2_tcu4
Version
520.2
Status
affected
Version <=
511.5_tcu4_hf3
Version
520.2_tcu4_hfr2
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.11% | 0.298 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
psirt@honeywell.com | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-1295 Debug Messages Revealing Unnecessary Information
The product fails to adequately prevent the revealing of unnecessary and potentially sensitive system information within debugging messages.