CVE-2023-5390: CWE-36 in Honeywell ControlEdge UOC
An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.
AI Analysis
Technical Summary
CVE-2023-5390 is a medium-severity vulnerability identified in Honeywell's ControlEdge UOC and Experion ControlEdge VirtualUOC products, which are industrial control system (ICS) components used for process automation and control. The vulnerability is classified under CWE-36, which corresponds to a path traversal issue. This flaw allows an unauthenticated remote attacker to read arbitrary files from the affected controllers by exploiting improper validation of file paths. Specifically, the attacker can craft requests that traverse directories to access files outside the intended directory scope, potentially exposing sensitive device information. The vulnerability affects multiple versions of the ControlEdge UOC product line, including versions 510.1, 511.1, 520.1, and 520.2. The CVSS v3.1 base score is 5.3, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), and no impact on integrity or availability (I:N/A:N). Honeywell recommends updating to the latest product version to remediate this vulnerability. No known exploits have been reported in the wild at this time. The vulnerability's impact is primarily limited to confidentiality, as it allows reading files that may contain device information but does not enable modification or disruption of device operations. Given the nature of ICS environments, any unauthorized information disclosure could aid attackers in further reconnaissance or targeted attacks.
Potential Impact
For European organizations operating industrial control systems that incorporate Honeywell ControlEdge UOC devices, this vulnerability poses a risk of unauthorized disclosure of sensitive configuration or operational files. While the immediate impact is limited to confidentiality, the leaked information could facilitate more sophisticated attacks, such as targeted intrusions or sabotage, especially in critical infrastructure sectors like energy, manufacturing, and utilities. The lack of required authentication and user interaction increases the risk of remote exploitation. Given the strategic importance of ICS in European critical infrastructure, even limited information disclosure could have cascading effects on operational security and resilience. Organizations may face regulatory scrutiny under frameworks like NIS2 and GDPR if sensitive operational data is exposed. The absence of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent potential exploitation.
Mitigation Recommendations
European organizations should prioritize upgrading Honeywell ControlEdge UOC devices to the latest firmware versions as recommended by Honeywell to eliminate the vulnerability. In addition to patching, network segmentation should be enforced to isolate ICS devices from general enterprise networks and the internet, minimizing exposure. Implement strict access controls and monitoring on ICS network traffic to detect anomalous file access attempts. Employ intrusion detection systems (IDS) tailored for ICS environments to identify exploitation attempts. Regularly audit device configurations and file system permissions to ensure no unnecessary file exposure. Where possible, restrict remote access to the ControlEdge UOC devices using VPNs with strong authentication and limit access to trusted personnel. Conduct security awareness training for ICS operators to recognize and report suspicious activity. Finally, maintain an incident response plan specific to ICS environments to quickly address any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2023-5390: CWE-36 in Honeywell ControlEdge UOC
Description
An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.
AI-Powered Analysis
Technical Analysis
CVE-2023-5390 is a medium-severity vulnerability identified in Honeywell's ControlEdge UOC and Experion ControlEdge VirtualUOC products, which are industrial control system (ICS) components used for process automation and control. The vulnerability is classified under CWE-36, which corresponds to a path traversal issue. This flaw allows an unauthenticated remote attacker to read arbitrary files from the affected controllers by exploiting improper validation of file paths. Specifically, the attacker can craft requests that traverse directories to access files outside the intended directory scope, potentially exposing sensitive device information. The vulnerability affects multiple versions of the ControlEdge UOC product line, including versions 510.1, 511.1, 520.1, and 520.2. The CVSS v3.1 base score is 5.3, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), and no impact on integrity or availability (I:N/A:N). Honeywell recommends updating to the latest product version to remediate this vulnerability. No known exploits have been reported in the wild at this time. The vulnerability's impact is primarily limited to confidentiality, as it allows reading files that may contain device information but does not enable modification or disruption of device operations. Given the nature of ICS environments, any unauthorized information disclosure could aid attackers in further reconnaissance or targeted attacks.
Potential Impact
For European organizations operating industrial control systems that incorporate Honeywell ControlEdge UOC devices, this vulnerability poses a risk of unauthorized disclosure of sensitive configuration or operational files. While the immediate impact is limited to confidentiality, the leaked information could facilitate more sophisticated attacks, such as targeted intrusions or sabotage, especially in critical infrastructure sectors like energy, manufacturing, and utilities. The lack of required authentication and user interaction increases the risk of remote exploitation. Given the strategic importance of ICS in European critical infrastructure, even limited information disclosure could have cascading effects on operational security and resilience. Organizations may face regulatory scrutiny under frameworks like NIS2 and GDPR if sensitive operational data is exposed. The absence of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent potential exploitation.
Mitigation Recommendations
European organizations should prioritize upgrading Honeywell ControlEdge UOC devices to the latest firmware versions as recommended by Honeywell to eliminate the vulnerability. In addition to patching, network segmentation should be enforced to isolate ICS devices from general enterprise networks and the internet, minimizing exposure. Implement strict access controls and monitoring on ICS network traffic to detect anomalous file access attempts. Employ intrusion detection systems (IDS) tailored for ICS environments to identify exploitation attempts. Regularly audit device configurations and file system permissions to ensure no unnecessary file exposure. Where possible, restrict remote access to the ControlEdge UOC devices using VPNs with strong authentication and limit access to trusted personnel. Conduct security awareness training for ICS operators to recognize and report suspicious activity. Finally, maintain an incident response plan specific to ICS environments to quickly address any exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Honeywell
- Date Reserved
- 2023-10-04T17:50:05.792Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683879c8182aa0cae2829666
Added to database: 5/29/2025, 3:14:16 PM
Last enriched: 7/8/2025, 1:12:24 AM
Last updated: 8/16/2025, 10:15:34 PM
Views: 12
Related Threats
CVE-2025-3495: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Delta Electronics COMMGR
CriticalCVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.