CVE-2013-0108

Honeywell Enterprise Buildings Integrator - Code Injection

Title source: rule

Description

An ActiveX control in HscRemoteDeploy.dll in Honeywell Enterprise Buildings Integrator (EBI) R310, R400.2, R410.1, and R410.2; SymmetrE R310, R410.1, and R410.2; ComfortPoint Open Manager (aka CPO-M) Station R100; and HMIWeb Browser client packages allows remote attackers to execute arbitrary code via a crafted HTML document.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/24745
metasploit WORKING POC EXCELLENT
by juan vazquez · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/honeywell_hscremotedeploy_exec.rb

Scores

EPSS 0.6143
EPSS Percentile 98.3%

Details

CWE
CWE-94
Status published
Products (8)
honeywell/comfortpoint_open_manager_station r100
honeywell/enterprise_buildings_integrator r310
honeywell/enterprise_buildings_integrator r400.2
honeywell/enterprise_buildings_integrator r410.1
honeywell/enterprise_buildings_integrator r410.2
honeywell/symmetre r310
honeywell/symmetre r400.2
honeywell/symmetre r410.1
Published Feb 24, 2013
Tracked Since Feb 18, 2026