7.4
CVE-2023-5396
- EPSS 0.85%
- Veröffentlicht 17.04.2024 17:15:13
- Zuletzt bearbeitet 21.11.2024 08:41:41
- Quelle psirt@honeywell.com
- Teams Watchlist Login
- Unerledigt Login
Server receiving a malformed message creates connection for a hostname that may cause a stack overflow resulting in possible remote code execution. See Honeywell Security Notification for recommendations on upgrading and versioning.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerHoneywell
≫
Produkt
Experion Server
Default Statusunaffected
Version <=
520.2 TCU4
Version
520.2
Status
affected
Version <=
510.2 HF13
Version
510.1
Status
affected
Version <=
520.1 TCU4
Version
520.1
Status
affected
Version <=
511.5 TCU4 HF3
Version
511.1
Status
affected
HerstellerHoneywell
≫
Produkt
Experion Server
Default Statusunaffected
Version <=
520.2 TCU4
Version
520.2
Status
affected
Version <=
511.5 TCU4 HF3
Version
511.1
Status
affected
Version <=
520.1 TCU4
Version
520.1
Status
affected
HerstellerHoneywell
≫
Produkt
Experion Server
Default Statusunaffected
Version <=
520.2 TCU4
Version
520.2
Status
affected
Version <=
520.1 TCU4
Version
520.1
Status
affected
Version <=
511.5 TCU4 HF3
Version
520.2 TCU4 HFR2
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.85% | 0.741 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
psirt@honeywell.com | 7.4 | 2.2 | 5.2 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
|
CWE-805 Buffer Access with Incorrect Length Value
The product uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer.