Description
Server hostname translation to IP address manipulation which could lead to an attacker performing remote code execution or causing a failure.
See Honeywell Security Notification for recommendations on upgrading and versioning.
See Honeywell Security Notification for recommendations on upgrading and versioning.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-57718 | Server hostname translation to IP address manipulation which could lead to an attacker performing remote code execution or causing a failure. See Honeywell Security Notification for recommendations on upgrading and versioning. |
References
| Link | Providers |
|---|---|
| https://process.honeywell.com |
|
History
No history.
Status: PUBLISHED
Assigner: Honeywell
Published:
Updated: 2024-08-29T19:38:53.821Z
Reserved: 2023-10-04T17:50:52.659Z
Link: CVE-2023-5403
Updated: 2024-08-02T07:59:44.423Z
Status : Deferred
Published: 2024-04-17T17:15:13.960
Modified: 2026-04-15T00:35:42.020
Link: CVE-2023-5403
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:32:01Z
Weaknesses
EUVD