If an attacker manages to trick a valid user into loading a malicious DLL, the attacker may be able to achieve code execution in Honeywell SoftMaster version 4.51 application’s context and permissions.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-34602 If an attacker manages to trick a valid user into loading a malicious DLL, the attacker may be able to achieve code execution in Honeywell SoftMaster version 4.51 application’s context and permissions.
Fixes

Solution

Honeywell has released firmware update packages for the affected products on their website. More information can be found in the Honeywell Security Notification SN2022-08-31 01 SoftMaster-R4.7


Workaround

Honeywell recommends users with potentially affected products take the following steps to protect themselves: Update firmware of vulnerable and affected devices. Isolate systems from the internet or create additional layers of defense to their system from the internet by placing the affected hardware behind a firewall or into a demilitarized zone (DMZ). If remote connections to the network are required, then users should consider using a VPN or other means to ensure secure remote connections into the network where the device is located. More information can be found in the Honeywell Security Notification SN2022-08-31 01 SoftMaster-R4.7

History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.01377}

epss

{'score': 0.01468}


Wed, 16 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T17:47:27.339Z

Reserved: 2022-07-06T00:00:00.000Z

Link: CVE-2022-2333

cve-icon Vulnrichment

Updated: 2024-08-03T00:32:09.614Z

cve-icon NVD

Status : Modified

Published: 2022-09-16T22:15:10.667

Modified: 2024-11-21T07:00:47.260

Link: CVE-2022-2333

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.