CVE-2023-5390

MEDIUM

Honeywell Controledge Unit Operations... - Path Traversal

Title source: rule
STIX 2.1

Description

An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.

Scores

CVSS v3 5.3
EPSS 0.0015
EPSS Percentile 35.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-22 CWE-36
Status published
Products (2)
honeywell/controledge_unit_operations_controller_firmware
honeywell/controledge_virtual_unit_operations_controller_firmware
Published Jan 31, 2024
Tracked Since Feb 18, 2026