CVE-2023-5390
MEDIUMHoneywell Controledge Unit Operations... - Path Traversal
Title source: ruleDescription
An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.
Scores
CVSS v3
5.3
EPSS
0.0015
EPSS Percentile
35.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-22
CWE-36
Status
published
Products (2)
honeywell/controledge_unit_operations_controller_firmware
honeywell/controledge_virtual_unit_operations_controller_firmware
Published
Jan 31, 2024
Tracked Since
Feb 18, 2026