Missing Authentication Vulnerability in Honeywell Experion PKS Safety Manager
CVE-2022-30313

7.5HIGH

Key Information:

Vendor

Honeywell

Vendor
CVE Published:
28 July 2022

What is CVE-2022-30313?

The Honeywell Experion PKS Safety Manager is plagued by a significant vulnerability that allows unauthorized access to critical system functions. This issue exists due to multiple proprietary protocols, including Experion TCP (51000/TCP) and Safety Builder (51010/TCP), which lack authentication mechanisms. Without authentication, an attacker who can communicate with the affected ports could manipulate the controller state, alter configurations, change logic, and access sensitive files. Commands such as starting or stopping controllers, reading or writing files, and adjusting system time can be executed without proper credentials. While some functionalities may require physical access to the Safety Manager's keyswitch, the lack of authentication on these protocols poses severe risks to the integrity and safety of the system.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.