Description
Honeywell ProWatch, 4.5, including all Service Pack versions, contain a Vulnerability in Application Server's executable folder(s). A(n) attacker could potentially exploit this vulnerability, leading to a standard user to have arbitrary system code execution. Honeywell recommends updating to the most recent version of this product, service or offering (Pro-watch 6.0.2, 6.0, 5.5.2,5.0.5).

Published: 2023-11-17
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-58429 Honeywell ProWatch, 4.5, including all Service Pack versions, contain a Vulnerability in Application Server's executable folder(s). A(n) attacker could potentially exploit this vulnerability, leading to a standard user to have arbitrary system code execution. Honeywell recommends updating to the most recent version of this product, service or offering (Pro-watch 6.0.2, 6.0, 5.5.2,5.0.5).
History

No history.

Subscriptions

Honeywell Prowatch
cve-icon MITRE

Status: PUBLISHED

Assigner: Honeywell

Published:

Updated: 2024-09-04T19:05:03.199Z

Reserved: 2023-11-16T17:28:41.240Z

Link: CVE-2023-6179

cve-icon Vulnrichment

Updated: 2024-08-02T08:21:17.814Z

cve-icon NVD

Status : Modified

Published: 2023-11-17T17:15:08.047

Modified: 2024-11-21T08:43:18.110

Link: CVE-2023-6179

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses