An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. 
History

Tue, 17 Jun 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Honeywell

Published: 2024-01-30T20:00:50.382Z

Updated: 2025-06-17T21:29:17.826Z

Reserved: 2023-10-04T17:49:59.920Z

Link: CVE-2023-5389

cve-icon Vulnrichment

Updated: 2024-08-02T07:59:44.048Z

cve-icon NVD

Status : Modified

Published: 2024-01-30T20:15:45.420

Modified: 2024-11-21T08:41:40.437

Link: CVE-2023-5389

cve-icon Redhat

No data.