Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Controledge_plc_firmware
(Honeywell)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-08-31 | CVE-2022-30318 | Honeywell ControlEdge through R151.1 uses Hard-coded Credentials. According to FSCT-2022-0056, there is a Honeywell ControlEdge hardcoded credentials issue. The affected components are characterized as: SSH. The potential impact is: Remote code execution, manipulate configuration, denial of service. The Honeywell ControlEdge PLC and RTU product line exposes an SSH service on port 22/TCP. Login as root to this service is permitted and credentials for the root user are hardcoded without... | Controledge_plc_firmware, Controledge_rtu_firmware | 9.8 | ||
2020-06-26 | CVE-2020-10628 | ControlEdge PLC (R130.2, R140, R150, and R151) and RTU (R101, R110, R140, R150, and R151) exposes unencrypted passwords on the network. | Controledge_plc_firmware, Controledge_rtu_firmware | N/A | ||
2020-06-26 | CVE-2020-10624 | ControlEdge PLC (R130.2, R140, R150, and R151) and RTU (R101, R110, R140, R150, and R151) exposes a session token on the network. | Controledge_plc_firmware, Controledge_rtu_firmware | N/A |