Description
If an attacker manages to trick a valid user into loading a malicious DLL, the attacker may be able to achieve code execution in Honeywell SoftMaster version 4.51 application’s context and permissions.
Published: 2022-09-16
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Honeywell has released firmware update packages for the affected products on their website. More information can be found in the Honeywell Security Notification SN2022-08-31 01 SoftMaster-R4.7


Vendor Workaround

Honeywell recommends users with potentially affected products take the following steps to protect themselves: Update firmware of vulnerable and affected devices. Isolate systems from the internet or create additional layers of defense to their system from the internet by placing the affected hardware behind a firewall or into a demilitarized zone (DMZ). If remote connections to the network are required, then users should consider using a VPN or other means to ensure secure remote connections into the network where the device is located. More information can be found in the Honeywell Security Notification SN2022-08-31 01 SoftMaster-R4.7

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-34602 If an attacker manages to trick a valid user into loading a malicious DLL, the attacker may be able to achieve code execution in Honeywell SoftMaster version 4.51 application’s context and permissions.
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.01377}

epss

{'score': 0.01468}


Wed, 16 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Honeywell Softmaster
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T17:47:27.339Z

Reserved: 2022-07-06T00:00:00.000Z

Link: CVE-2022-2333

cve-icon Vulnrichment

Updated: 2024-08-03T00:32:09.614Z

cve-icon NVD

Status : Modified

Published: 2022-09-16T22:15:10.667

Modified: 2024-11-21T07:00:47.260

Link: CVE-2022-2333

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses