Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-30314

EPSS 0.07% · P22
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-30314

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Honeywell Experion PKS Safety Manager 5.02 uses Hard-coded Credentials. According to FSCT-2022-0052, there is a Honeywell Experion PKS Safety Manager hardcoded credentials issue. The affected components are characterized as: POLO bootloader. The potential impact is: Manipulate firmware. The Honeywell Experion PKS Safety Manager utilizes the DCOM-232/485 serial interface for firmware management purposes. When booting, the Safety Manager exposes the Enea POLO bootloader via this interface. Access to the boot configuration is controlled by means of credentials hardcoded in the Safety Manager firmware. The credentials for the bootloader are hardcoded in the firmware. An attacker with access to the serial interface (either through physical access, a compromised EWS or an exposed serial-to-ethernet gateway) can utilize these credentials to control the boot process and manipulate the unauthenticated firmware image (see FSCT-2022-0054).
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Honeywell Safety Manager 信任管理问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Honeywell Safety Manager是美国霍尼韦尔(Honeywell)公司的用于最大限度地减少事故、最大限度地延长生产正常运行时间、降低合规成本并管理工厂安全。 Honeywell Safety Manager R160.1之前版本存在信任管理问题漏洞,该漏洞源于对引导配置的访问由安全管理器固件中硬编码的凭据控制,攻击者利用该漏洞能够控制启动过程并操纵固件映像。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2022-30314

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-30314

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-07-28 · 46 CVEs total

CVE-2022-369929.9 CRITICALVeritas NetBackup 安全漏洞
CVE-2022-369909.6 CRITICALVeritas NetBackup 安全漏洞
CVE-2022-369898.8 HIGHVeritas NetBackup 安全漏洞
CVE-2022-369938.8 HIGHVeritas NetBackup 安全漏洞
CVE-2022-369868.6 HIGHVeritas NetBackup 安全漏洞
CVE-2022-369878.5 HIGHVeritas NetBackup 安全漏洞
CVE-2022-369918.1 HIGHVeritas NetBackup 安全漏洞
CVE-2022-369888.0 HIGHVeritas NetBackup 安全漏洞
CVE-2022-369857.8 HIGHVeritas NetBackup 安全漏洞
CVE-2022-369847.7 HIGHVeritas NetBackup 安全漏洞
CVE-2022-369977.1 HIGHVeritas NetBackup 代码问题漏洞
CVE-2022-370006.5 MEDIUMVeritas NetBackup 安全漏洞
CVE-2022-369996.5 MEDIUMVeritas NetBackup 安全漏洞
CVE-2022-369946.3 MEDIUMVeritas NetBackup 安全漏洞
CVE-2022-369986.3 MEDIUMVeritas NetBackup 缓冲区错误漏洞
CVE-2022-369954.3 MEDIUMVeritas NetBackup 安全漏洞
CVE-2022-369964.3 MEDIUMVeritas NetBackup 安全漏洞
CVE-2022-30287Horde Groupware Webmail 跨站请求伪造漏洞
CVE-2021-41556SQUIRREL 缓冲区错误漏洞
CVE-2022-34580Advanced School Management System 跨站脚本漏洞

Showing top 20 of 46 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-30314

No comments yet


Leave a comment