Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be store on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-35449 Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be store on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T06:40:47.841Z

Reserved: 2022-05-04T00:00:00

Link: CVE-2022-30244

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-07-15T12:15:08.820

Modified: 2024-11-21T07:02:26.740

Link: CVE-2022-30244

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.