CVE-2023-5395 (GCVE-0-2023-5395)

Vulnerability from cvelistv5 – Published: 2024-04-17 16:37 – Updated: 2024-08-02 07:59
VLAI?
Summary
Server receiving a malformed message that uses the hostname in an internal table may cause a stack overflow resulting in possible remote code execution. See Honeywell Security Notification for recommendations on upgrading and versioning.
CWE
Assigner
References
Impacted products
Vendor Product Version
Honeywell Experion Server Affected: 520.2 , ≤ 520.2 TCU4 (semver)
Affected: 510.1 , ≤ 510.2 HF13 (semver)
Affected: 520.1 , ≤ 520.1 TCU4 (semver)
Affected: 511.1 , ≤ 511.5 TCU4 HF3 (semver)
Create a notification for this product.
    Honeywell Experion Server Affected: 520.2 , ≤ 520.2 TCU4 (semver)
Affected: 511.1 , ≤ 511.5 TCU4 HF3 (semver)
Affected: 520.1 , ≤ 520.1 TCU4 (semver)
Create a notification for this product.
    Honeywell Experion Server Affected: 520.2 , ≤ 520.2 TCU4 (semver)
Affected: 520.1 , ≤ 520.1 TCU4 (semver)
Affected: 520.2 TCU4 HFR2 , ≤ 511.5 TCU4 HF3 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:honeywell:experion_server:520.2:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "experion_server",
            "vendor": "honeywell",
            "versions": [
              {
                "lessThanOrEqual": "520.2_tcu4",
                "status": "affected",
                "version": "520.2",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:honeywell:experion_server:510.1:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "experion_server",
            "vendor": "honeywell",
            "versions": [
              {
                "lessThanOrEqual": "510.2_hf13",
                "status": "affected",
                "version": "510.1",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:honeywell:experion_server:520.1:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "experion_server",
            "vendor": "honeywell",
            "versions": [
              {
                "lessThanOrEqual": "520.1_tcu4",
                "status": "affected",
                "version": "520.1",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:honeywell:experion_server:511.1:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "experion_server",
            "vendor": "honeywell",
            "versions": [
              {
                "lessThanOrEqual": "511.5_tcu4_hf3",
                "status": "affected",
                "version": "511.1",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-5395",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-23T18:42:52.918169Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-08T18:58:46.645Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:59:44.353Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://process.honeywell.com"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Experion PKS"
          ],
          "product": "Experion Server",
          "vendor": "Honeywell",
          "versions": [
            {
              "changes": [
                {
                  "at": "520.2 TCU4 HF1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "520.2 TCU4",
              "status": "affected",
              "version": "520.2",
              "versionType": "semver"
            },
            {
              "changes": [
                {
                  "at": "510.2 HF14",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "510.2 HF13",
              "status": "affected",
              "version": "510.1",
              "versionType": "semver"
            },
            {
              "changes": [
                {
                  "at": "520.1 TCU5",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "520.1 TCU4",
              "status": "affected",
              "version": "520.1",
              "versionType": "semver"
            },
            {
              "changes": [
                {
                  "at": "511.5 TCU4 HF4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "511.5 TCU4 HF3",
              "status": "affected",
              "version": "511.1",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Experion LX"
          ],
          "product": "Experion Server",
          "vendor": "Honeywell",
          "versions": [
            {
              "changes": [
                {
                  "at": "520.2 TCU4 HF2",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "520.2 TCU4",
              "status": "affected",
              "version": "520.2",
              "versionType": "semver"
            },
            {
              "changes": [
                {
                  "at": "511.5 TCU4 HF4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "511.5 TCU4 HF3",
              "status": "affected",
              "version": "511.1",
              "versionType": "semver"
            },
            {
              "changes": [
                {
                  "at": "520.1 TCU5",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "520.1 TCU4",
              "status": "affected",
              "version": "520.1",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "PlantCruise by Experion"
          ],
          "product": "Experion Server",
          "vendor": "Honeywell",
          "versions": [
            {
              "changes": [
                {
                  "at": "520.2 TCU4 HF2",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "520.2 TCU4",
              "status": "affected",
              "version": "520.2",
              "versionType": "semver"
            },
            {
              "changes": [
                {
                  "at": "520.1 TCU5",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "520.1 TCU4",
              "status": "affected",
              "version": "520.1",
              "versionType": "semver"
            },
            {
              "changes": [
                {
                  "at": "511.5 TCU4 HF4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "511.5 TCU4 HF3",
              "status": "affected",
              "version": "520.2 TCU4 HFR2",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Server receiving a malformed message that uses the hostname in an internal table may cause a stack overflow resulting in possible remote code execution.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eSee Honeywell Security Notification for recommendations on upgrading and versioning.\u003c/span\u003e\n\n"
            }
          ],
          "value": "Server receiving a malformed message that uses the hostname in an internal table may cause a stack overflow resulting in possible remote code execution.\u00a0See Honeywell Security Notification for recommendations on upgrading and versioning.\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "CWE-121",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-25T16:56:40.621Z",
        "orgId": "0dc86260-d7e3-4e81-ba06-3508e030ce8d",
        "shortName": "Honeywell"
      },
      "references": [
        {
          "url": "https://process.honeywell.com"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "0dc86260-d7e3-4e81-ba06-3508e030ce8d",
    "assignerShortName": "Honeywell",
    "cveId": "CVE-2023-5395",
    "datePublished": "2024-04-17T16:37:00.868Z",
    "dateReserved": "2023-10-04T17:50:47.748Z",
    "dateUpdated": "2024-08-02T07:59:44.353Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Server receiving a malformed message that uses the hostname in an internal table may cause a stack overflow resulting in possible remote code execution.\\u00a0See Honeywell Security Notification for recommendations on upgrading and versioning.\\n\\n\"}, {\"lang\": \"es\", \"value\": \"El servidor que recibe un mensaje con formato incorrecto que utiliza el nombre de host en una tabla interna puede causar un desbordamiento de la pila que resulta en una posible ejecuci\\u00f3n remota de c\\u00f3digo. Consulte la Notificaci\\u00f3n de seguridad de Honeywell para obtener recomendaciones sobre actualizaci\\u00f3n y control de versiones.\"}]",
      "id": "CVE-2023-5395",
      "lastModified": "2024-11-21T08:41:41.190",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"psirt@honeywell.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 5.9}]}",
      "published": "2024-04-17T17:15:12.850",
      "references": "[{\"url\": \"https://process.honeywell.com\", \"source\": \"psirt@honeywell.com\"}, {\"url\": \"https://process.honeywell.com\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "psirt@honeywell.com",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"psirt@honeywell.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-121\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-5395\",\"sourceIdentifier\":\"psirt@honeywell.com\",\"published\":\"2024-04-17T17:15:12.850\",\"lastModified\":\"2024-11-21T08:41:41.190\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Server receiving a malformed message that uses the hostname in an internal table may cause a stack overflow resulting in possible remote code execution.\u00a0See Honeywell Security Notification for recommendations on upgrading and versioning.\\n\\n\"},{\"lang\":\"es\",\"value\":\"El servidor que recibe un mensaje con formato incorrecto que utiliza el nombre de host en una tabla interna puede causar un desbordamiento de la pila que resulta en una posible ejecuci\u00f3n remota de c\u00f3digo. Consulte la Notificaci\u00f3n de seguridad de Honeywell para obtener recomendaciones sobre actualizaci\u00f3n y control de versiones.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@honeywell.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@honeywell.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-121\"}]}],\"references\":[{\"url\":\"https://process.honeywell.com\",\"source\":\"psirt@honeywell.com\"},{\"url\":\"https://process.honeywell.com\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://process.honeywell.com\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T07:59:44.353Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-5395\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-04-23T18:42:52.918169Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:honeywell:experion_server:520.2:*:*:*:*:*:*:*\"], \"vendor\": \"honeywell\", \"product\": \"experion_server\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2_tcu4\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:honeywell:experion_server:510.1:*:*:*:*:*:*:*\"], \"vendor\": \"honeywell\", \"product\": \"experion_server\", \"versions\": [{\"status\": \"affected\", \"version\": \"510.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"510.2_hf13\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:honeywell:experion_server:520.1:*:*:*:*:*:*:*\"], \"vendor\": \"honeywell\", \"product\": \"experion_server\", \"versions\": [{\"status\": \"affected\", \"version\": \"520.1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"520.1_tcu4\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:honeywell:experion_server:511.1:*:*:*:*:*:*:*\"], \"vendor\": \"honeywell\", \"product\": \"experion_server\", \"versions\": [{\"status\": \"affected\", \"version\": \"511.1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"511.5_tcu4_hf3\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-04-23T18:51:49.600Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"impacts\": [{\"capecId\": \"CAPEC-100\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-100\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Honeywell\", \"product\": \"Experion Server\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"520.2 TCU4 HF1\", \"status\": \"unaffected\"}], \"version\": \"520.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU4\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"510.2 HF14\", \"status\": \"unaffected\"}], \"version\": \"510.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"510.2 HF13\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"520.1 TCU5\", \"status\": \"unaffected\"}], \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.1 TCU4\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"511.5 TCU4 HF4\", \"status\": \"unaffected\"}], \"version\": \"511.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"511.5 TCU4 HF3\"}], \"platforms\": [\"Experion PKS\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"Experion Server\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"520.2 TCU4 HF2\", \"status\": \"unaffected\"}], \"version\": \"520.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU4\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"511.5 TCU4 HF4\", \"status\": \"unaffected\"}], \"version\": \"511.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"511.5 TCU4 HF3\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"520.1 TCU5\", \"status\": \"unaffected\"}], \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.1 TCU4\"}], \"platforms\": [\"Experion LX\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Honeywell\", \"product\": \"Experion Server\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"520.2 TCU4 HF2\", \"status\": \"unaffected\"}], \"version\": \"520.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.2 TCU4\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"520.1 TCU5\", \"status\": \"unaffected\"}], \"version\": \"520.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"520.1 TCU4\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"511.5 TCU4 HF4\", \"status\": \"unaffected\"}], \"version\": \"520.2 TCU4 HFR2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"511.5 TCU4 HF3\"}], \"platforms\": [\"PlantCruise by Experion\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://process.honeywell.com\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Server receiving a malformed message that uses the hostname in an internal table may cause a stack overflow resulting in possible remote code execution.\\u00a0See Honeywell Security Notification for recommendations on upgrading and versioning.\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Server receiving a malformed message that uses the hostname in an internal table may cause a stack overflow resulting in possible remote code execution.\u0026nbsp;\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eSee Honeywell Security Notification for recommendations on upgrading and versioning.\u003c/span\u003e\\n\\n\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-121\", \"description\": \"CWE-121\"}]}], \"providerMetadata\": {\"orgId\": \"0dc86260-d7e3-4e81-ba06-3508e030ce8d\", \"shortName\": \"Honeywell\", \"dateUpdated\": \"2024-04-25T16:56:40.621Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-5395\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-02T07:59:44.353Z\", \"dateReserved\": \"2023-10-04T17:50:47.748Z\", \"assignerOrgId\": \"0dc86260-d7e3-4e81-ba06-3508e030ce8d\", \"datePublished\": \"2024-04-17T16:37:00.868Z\", \"assignerShortName\": \"Honeywell\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…