Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-34602 | If an attacker manages to trick a valid user into loading a malicious DLL, the attacker may be able to achieve code execution in Honeywell SoftMaster version 4.51 application’s context and permissions. |
Solution
Honeywell has released firmware update packages for the affected products on their website. More information can be found in the Honeywell Security Notification SN2022-08-31 01 SoftMaster-R4.7
Workaround
Honeywell recommends users with potentially affected products take the following steps to protect themselves: Update firmware of vulnerable and affected devices. Isolate systems from the internet or create additional layers of defense to their system from the internet by placing the affected hardware behind a firewall or into a demilitarized zone (DMZ). If remote connections to the network are required, then users should consider using a VPN or other means to ensure secure remote connections into the network where the device is located. More information can be found in the Honeywell Security Notification SN2022-08-31 01 SoftMaster-R4.7
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 16 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T17:47:27.339Z
Reserved: 2022-07-06T00:00:00.000Z
Link: CVE-2022-2333
Updated: 2024-08-03T00:32:09.614Z
Status : Modified
Published: 2022-09-16T22:15:10.667
Modified: 2024-11-21T07:00:47.260
Link: CVE-2022-2333
No data.
OpenCVE Enrichment
No data.
EUVD