Honeywell ProWatch, 4.5, including all Service Pack versions, contain a Vulnerability in Application Server's executable folder(s). A(n) attacker could potentially exploit this vulnerability, leading to a standard user to have arbitrary system code execution. Honeywell recommends updating to the most recent version of this product, service or offering (Pro-watch 6.0.2, 6.0, 5.5.2,5.0.5).
References
Configurations
History
21 Nov 2024, 08:43
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://buildings.honeywell.com/us/en/brands/our-brands/security/support-and-resources/product-resources/eol-and-security-notices - Product | |
| References | () https://www.honeywell.com/us/en/product-security - Not Applicable |
25 Nov 2023, 02:13
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-732 | |
| CPE | cpe:2.3:a:honeywell:prowatch:4.5:*:*:*:*:*:*:* | |
| First Time |
Honeywell
Honeywell prowatch |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| References | () https://www.honeywell.com/us/en/product-security - Not Applicable | |
| References | () https://buildings.honeywell.com/us/en/brands/our-brands/security/support-and-resources/product-resources/eol-and-security-notices - Product |
17 Nov 2023, 17:28
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-11-17 17:15
Updated : 2024-11-21 08:43
NVD link : CVE-2023-6179
Mitre link : CVE-2023-6179
CVE.ORG link : CVE-2023-6179
JSON object : View
Products Affected
honeywell
- prowatch
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource
